-
In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as well as fixing them for consistency. Thanks to Dave Thaler, Brian Zill, and Rich Draves for clarifying our IPv6 questions, Mohammad Alam and Rajesh Peddibhotla for help with reliable multicasting, and Jeff Venable for his contributions on the Network Location Awareness functionality. Thanks to Vadim Eydelman for his Winsock expertise. And finally we would like to thank the .NET Application Frameworks team (Lance Olson, Mauro Ottaviani, and Ron Alberda) for their help with our questions about .NET Sockets.
標簽:
the
contributed
addition
to
上傳時間:
2015-12-17
上傳用戶:dongqiangqiang
-
In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will utilize on the network too and Outlook Expres software are disseminated .
標簽:
disseminates
duplicates
and
infecting
上傳時間:
2017-01-13
上傳用戶:fhzm5658
-
在網(wǎng)絡(luò)安全中經(jīng)常會遇到rootkit,NSA安全和入侵檢測術(shù)語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
標簽:
rootkit
網(wǎng)絡(luò)安全
上傳時間:
2017-04-04
上傳用戶:xaijhqx
-
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
標簽:
destination
generate
between
traffic
上傳時間:
2017-08-06
上傳用戶:gaome
-
SharpPcap c#抓包實現(xiàn)時時獲取網(wǎng)卡信息
SharpPcap tutorial: a step by step guide to using SharpPcap
The text of this tutorial is taken directly from WinPcap's official tutorial but is modified to show the C# use of the SharpPcap library. All examples can be downloaded together with SharpPcap source code from SharpPcap 's homepage. The WinPcap library must be installed before attempting to run any of these examples, so please download and install the latest version from WinPcap's download page.
SharpPcap was written and tested using .NET v1.1 and Windows 2000/XP. I have no idea about other .NET and Windows versions. If you do try it, please report your results.
The following topics are covered in this tutorial:
Obtaining the device list
Obtaining advanced information about installed devices
Opening an adapter and capturing packets
Capturing packets without the event handler
Filtering the traffic
Interpreting the packets
Handling offline dump files
Sending Packets
Gathering Statistics on the network traffic
1. Obtaining the device list
標簽:
SharpPcap
c#抓包
獲取網(wǎng)卡信息
上傳時間:
2015-07-06
上傳用戶:muzongda
-
Much of Game Theory has developed within the community of Economists,
starting from the book “Theory of Games and Economic behavior” by Mor-
genstern and Von Neumann (1944). To a lesser extent, it has had an impact on
biology (with the development of evolutionarygames) and on road traffic Engi-
neering (triggered by the concept of Wardrop equilibrium introduced already
in 1952 along with the Beckmann potential approach introduced in 1956).
Since 1999 game theory has had a remarkable penetration into computer sci-
ence with the formation of the community of Algorithmic game theory.
標簽:
Distributed
Strategic
Learning
上傳時間:
2020-05-27
上傳用戶:shancjb
-
The insinuation of telecommunications into the daily fabric of our lives has been
arguably the most important and surprising development of the last 25 years. Before
this revolution, telephone service and its place in our lives had been largely stable
for more than a generation. The growth was, so to speak, lateral, as the global reach
of telecommunications extended and more people got telephone service. The
distinction between oversea and domestic calls blurred with the advances in
switching and transmission, undersea cable, and communication satellites. Traffic
on the network remained overwhelmingly voice, largely in analog format with
facsimile (Fax) beginning to make inroads.
標簽:
Telecommunications
Modeling
Analysis
and
of
上傳時間:
2020-05-31
上傳用戶:shancjb
-
A wireless communication network can be viewed as a collection of nodes, located in some domain, which
can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users,
base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, several nodes
transmit simultaneously, each toward its own receiver. Each transmitter–receiver pair requires its own
wireless link. The signal received from the link transmitter may be jammed by the signals received from
the other transmitters. Even in the simplest model where the signal power radiated from a point decays in
an isotropic way with Euclidean distance, the geometry of the locations of the nodes plays a key role since
it determines the signal to interference and noise ratio (SINR) at each receiver and hence the possibility of
establishing simultaneously this collection of links at a given bit rate. The interference seen by a receiver is
the sum of the signal powers received from all transmitters, except its own transmitter.
標簽:
Stochastic
Geometry
Networks
Wireless
Volume
and
II
上傳時間:
2020-06-01
上傳用戶:shancjb
-
CAN總線是汽車上應(yīng)用最廣泛的車載網(wǎng)絡(luò)總線,具有實時性強、可靠性高、成本低等優(yōu)點。鑒于此,介紹了一種利用飛思卡爾系列單片機MC9S12XS128作為控制器,利用其內(nèi)部的MSCAN模塊、CAN收發(fā)器TJA1040等外圍元件進行CAN總線通信節(jié)點設(shè)計。該設(shè)計能夠?qū)崿F(xiàn)CAN總線數(shù)據(jù)的發(fā)送與接收,可應(yīng)用于汽車及其他各種CAN總線通信系統(tǒng)。CAN bus is the most widely used on-board network bus in automobiles. It has the advantages of realtime, high reliability and low cost. In view of this,this paper introduces the design of CAN bus communication node by using Freescale MC9S12XS128 as controller,using its internal MSCAN module,CAN transceiver TJA1040 and other peripheral components. This design can realize the sending and receiving of CAN bus data,and can be used in automobile and other CAN bus communication systems.
標簽:
單片機
can總線
通信
上傳時間:
2022-03-27
上傳用戶:
-
C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services.
標簽:
Programming
frameworks
providing
coverage
上傳時間:
2013-12-26
上傳用戶:daguda