在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上傳時間: 2017-04-04
上傳用戶:xaijhqx
Symbolic Representations of Time Series... SAX is just as good as other representations, or working on the raw data for most problems (Slides shown at the end of this presentation)
標簽: Representations representations Symbolic working
上傳時間: 2014-01-16
上傳用戶:dongqiangqiang
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
標簽: perceptual implementation algorithms fingerpr
上傳時間: 2013-12-08
上傳用戶:星仔
Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Java language have grown, and grown. . . and grown. Now you can dabble in Swing, servlets, Enterprise JavaBeans (EJB), JavaMail, and more. Additionally, there are now packages of APIs, like the Java 2 Micro Edition (J2ME) and Java 2 Enterprise Edition (J2EE). While these packages seem to be nicely wrapped bundles of useful APIs, they don t help the average developer figure out how to piece together the APIs contained in these packages. Though it s simple to find documentation on the individual APIs, getting the "big picture" is difficult, at best. One of the most interesting, but difficult, aspects of Java today is building Java enterprise applications using the J2EE package.
標簽: confusing decisions become world
上傳時間: 2013-12-30
上傳用戶:haoxiyizhong
This SPI-mode SD Card controller is a free SOPC Builder component that can be used in any SOPC Builder system. The included example design runs on the Nios II Embedded Evaluation Kit, Cyclone III edition (NEEK).
標簽: SOPC controller component SPI-mode
上傳時間: 2013-12-18
上傳用戶:jing911003
This SPI-mode SD Card controller is a free SOPC Builder component that can be used in any SOPC Builder system. The included example design runs on the Nios II Embedded Evaluation Kit, Cyclone III edition (NEEK).
標簽: SOPC controller component SPI-mode
上傳時間: 2017-05-14
上傳用戶:LouieWu
在J2ME中實現虛擬代理,然后過濾user-agent ,用于突破廣東移動等的cmwap限制使用方法,啟動后將相應軟件(如Opera)的代理設成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of SMS, will start corresponding software (such as the Opera), the agent set to localhost 8080 can be
上傳時間: 2017-05-22
上傳用戶:wuyuying
one of video tool Skype only in windows mobile5.0 more than running, but my task is to let it run Skype in WINCE only in windows mobile5.0 more than running, but my task is to let it run in WINCE . Leave no stone unturned when I can not get windows mobile, they thought would be needed for skype all library files to my WINCE, so perhaps will be able to run skype. 1. Used depend Show skype depends on which files. In fact, not many documents, I can remember only under the following: core.dllcommctr.dllaygeshell.dllhtmlview.dll In addition to htmlview.dll, the other documents in WINCE have (if your system does not, please IMAGE Canada on the corresponding module). Therefore, I find on the Internet htmlview.dll, the results really find
標簽: running windows mobile Skype
上傳時間: 2014-01-17
上傳用戶:miaochun888
) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.
標簽: code Compression huffman provide
上傳時間: 2017-05-30
上傳用戶:yuchunhai1990
People have vast background knowledge to cope with everyday situations. We don t have to be told everything explicitly because we can call on the background knowledge. We use `default knowledge to handle situations where knowledge is incomplete. This is called common sense reasoning.
標簽: have background situations knowledge
上傳時間: 2017-06-03
上傳用戶:gmh1314