In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will utilize on the network too and Outlook Expres software are disseminated .
标签: disseminates duplicates and infecting
上传时间: 2017-01-13
上传用户:fhzm5658
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
标签: destination generate between traffic
上传时间: 2017-08-06
上传用户:gaome
SharpPcap c#抓包实现时时获取网卡信息 SharpPcap tutorial: a step by step guide to using SharpPcap The text of this tutorial is taken directly from WinPcap's official tutorial but is modified to show the C# use of the SharpPcap library. All examples can be downloaded together with SharpPcap source code from SharpPcap 's homepage. The WinPcap library must be installed before attempting to run any of these examples, so please download and install the latest version from WinPcap's download page. SharpPcap was written and tested using .NET v1.1 and Windows 2000/XP. I have no idea about other .NET and Windows versions. If you do try it, please report your results. The following topics are covered in this tutorial: Obtaining the device list Obtaining advanced information about installed devices Opening an adapter and capturing packets Capturing packets without the event handler Filtering the traffic Interpreting the packets Handling offline dump files Sending Packets Gathering Statistics on the network traffic 1. Obtaining the device list
上传时间: 2015-07-06
上传用户:muzongda
Much of Game Theory has developed within the community of Economists, starting from the book “Theory of Games and Economic behavior” by Mor- genstern and Von Neumann (1944). To a lesser extent, it has had an impact on biology (with the development of evolutionarygames) and on road traffic Engi- neering (triggered by the concept of Wardrop equilibrium introduced already in 1952 along with the Beckmann potential approach introduced in 1956). Since 1999 game theory has had a remarkable penetration into computer sci- ence with the formation of the community of Algorithmic game theory.
标签: Distributed Strategic Learning
上传时间: 2020-05-27
上传用户:shancjb
The insinuation of telecommunications into the daily fabric of our lives has been arguably the most important and surprising development of the last 25 years. Before this revolution, telephone service and its place in our lives had been largely stable for more than a generation. The growth was, so to speak, lateral, as the global reach of telecommunications extended and more people got telephone service. The distinction between oversea and domestic calls blurred with the advances in switching and transmission, undersea cable, and communication satellites. Traffic on the network remained overwhelmingly voice, largely in analog format with facsimile (Fax) beginning to make inroads.
标签: Telecommunications Modeling Analysis and of
上传时间: 2020-05-31
上传用户:shancjb
A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, several nodes transmit simultaneously, each toward its own receiver. Each transmitter–receiver pair requires its own wireless link. The signal received from the link transmitter may be jammed by the signals received from the other transmitters. Even in the simplest model where the signal power radiated from a point decays in an isotropic way with Euclidean distance, the geometry of the locations of the nodes plays a key role since it determines the signal to interference and noise ratio (SINR) at each receiver and hence the possibility of establishing simultaneously this collection of links at a given bit rate. The interference seen by a receiver is the sum of the signal powers received from all transmitters, except its own transmitter.
标签: Stochastic Geometry Networks Wireless Volume and II
上传时间: 2020-06-01
上传用户:shancjb
CAN总线是汽车上应用最广泛的车载网络总线,具有实时性强、可靠性高、成本低等优点。鉴于此,介绍了一种利用飞思卡尔系列单片机MC9S12XS128作为控制器,利用其内部的MSCAN模块、CAN收发器TJA1040等外围元件进行CAN总线通信节点设计。该设计能够实现CAN总线数据的发送与接收,可应用于汽车及其他各种CAN总线通信系统。CAN bus is the most widely used on-board network bus in automobiles. It has the advantages of realtime, high reliability and low cost. In view of this,this paper introduces the design of CAN bus communication node by using Freescale MC9S12XS128 as controller,using its internal MSCAN module,CAN transceiver TJA1040 and other peripheral components. This design can realize the sending and receiving of CAN bus data,and can be used in automobile and other CAN bus communication systems.
上传时间: 2022-03-27
上传用户:
C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services.
标签: Programming frameworks providing coverage
上传时间: 2013-12-26
上传用户:daguda
一个基于Matlab的人工免疫算法%Immune Algorithm based on the immune network model for function f(x1,x2) optimum
标签: Algorithm function network optimum
上传时间: 2013-12-23
上传用户:changeboy