亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

hashes

  • This program dump password hashes from local or remote Windows NT/2000 machines. It prints them on

    This program dump password hashes from local or remote Windows NT/2000 machines. It prints them onto the screen in l0phtcrack format, or will write them to a file if desired.

    標簽: password machines program Windows

    上傳時間: 2014-01-15

    上傳用戶:a673761058

  • L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    標簽: cryptographic L0phtCrack hashes 操作系統

    上傳時間: 2014-01-16

    上傳用戶:ztj182002

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    標簽: Programming developers for important

    上傳時間: 2015-09-03

    上傳用戶:gundan

  • By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998

    By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon

    標簽: Christiansen Torkington published Edition

    上傳時間: 2014-02-20

    上傳用戶:yyq123456789

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2014-11-29

    上傳用戶:kr770906

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2015-09-03

    上傳用戶:lifangyuan12

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標簽: perceptual implementation algorithms fingerpr

    上傳時間: 2013-12-08

    上傳用戶:星仔

主站蜘蛛池模板: 龙州县| 阿巴嘎旗| 兰溪市| 红河县| 松江区| 黎平县| 聂荣县| 清流县| 荥经县| 卢氏县| 库伦旗| 民权县| 涿州市| 张家口市| 军事| 邻水| 察雅县| 克拉玛依市| 余庆县| 治多县| 芦山县| 灵寿县| 会宁县| 钟祥市| 柳州市| 博野县| 策勒县| 简阳市| 永丰县| 通榆县| 蒙山县| 铜鼓县| 灵山县| 和政县| 高雄市| 尼勒克县| 邳州市| 鄂伦春自治旗| 革吉县| 辰溪县| 裕民县|