Internetwork Routing Protocol attack 程序
標簽: Internetwork Protocol Routing attack
上傳時間: 2014-01-24
上傳用戶:fanboynet
ip land attack by msdos
上傳時間: 2015-12-25
上傳用戶:日光微瀾
C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
標簽: implementaion for together library
上傳時間: 2017-07-05
上傳用戶:小鵬
This program finds the locations of placing n queens in a n*n chessboard so that none attack any other
標簽: chessboard locations program placing
上傳時間: 2014-11-17
上傳用戶:ma1301115706
german side channel attack description
標簽: description channel german attack
上傳時間: 2014-01-24
上傳用戶:caixiaoxu26
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
上傳時間: 2013-11-17
上傳用戶:llwap
Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.
上傳時間: 2014-12-24
上傳用戶:熊少鋒
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
標簽: WepDecrypt Wepdecrypt Wireless guesses
上傳時間: 2013-12-25
上傳用戶:6546544
五子棋小游戲#include<stdlib.h> #include<time.h> #include<stdio.h> #include<conio.h> int chess[169]={0} /*棋盤*/ struct chess_t/*作為輔助,即是作為建意*/ { char attack /*攻防用的,0表示守,1表示攻*/ int j /*作為優先級用*/ }chess_a[169]
上傳時間: 2016-05-18
上傳用戶:anng
本目錄下存放了演示web應用安全技術的例程序,具體用法如下: 1.attack目錄是演示JSP安全性漏洞及對策的web應用程序,可以直接部署到應用服務器并運行。 2.security目錄下存放演示保護web資源的例程序,tomcat子目錄下存放可以在tomcat下運行的web應用程序(security目錄)及在 tomcat下配置安全域的配置文件樣例(配置文件目錄), weblogic子目錄存放可以在weblogic下運行的web應用程序。
上傳時間: 2014-01-17
上傳用戶:lyy1234