-
Hacking-the-whole-solution-process
讲述黑客基础知识。
1.网络以及相关知识
2.入侵概念和基础知识
3.入侵基本过程和使用工具(Basic knowledge about the hacking.
1 Network and Knowledge
2 invasion concepts and basics
3. Invasion process and the use of basic tools)
- 2014-01-11 16:01:27下载
- 积分:1
-
YFP
说明: Think of ASP Trojan hunt 思易ASP木马追捕(Think of ASP Trojan hunt Siyi, the ASP Trojans.)
- 2019-04-19 06:37:57下载
- 积分:1
-
VoodooHDA.kext
good to go form Mac as a kext
- 2018-03-04 15:00:18下载
- 积分:1
-
Arcgis-java
java 开发gis 也就是用gisengine做第二次开发用到的一些库函数名和详细流程(gis java developer that is developing with gisengine a second name used in some of the library functions and detailed process)
- 2011-05-28 15:24:30下载
- 积分:1
-
GalaxyerPackager
this is the Android Rom Packager for CWM Recovery Update...it used to build a compressed and signed rom file to be burned on any android device supported with cwm recovery
- 2013-04-20 23:36:17下载
- 积分:1
-
LabelTest
UILabel简单使用,objective-c UILabel的简单使用(UILabel simple use)
- 2012-12-09 14:25:13下载
- 积分:1
-
telnet
telnet 工具
解决windows 7下无telnet命令问题(telnet tools)
- 2015-11-10 16:33:07下载
- 积分:1
-
NetWork_Xiexiren
计算机网络课件。。。。。。。谢西人的课件。。。。(Courseware for computer networks. . . . . . . West hsieh courseware. . . .)
- 2009-03-23 16:55:54下载
- 积分:1
-
hon-new
When the two nucleic acid sequences, when compared, K-Estimator used to assess the number of nucleotide substitutions between the two (Divergent), including the protein coding region and non-protein coding region. Using Monte Carlo simulation estimates of confidence intervals. In molecular evolutionary studies to assess the two nucleic acid sequences is replaced by the number of nucleotides is a central issue. Accurate quantification of these data will directly affect the evolution of genetics is widely used in many experiments of reliability.
- 2013-08-04 11:42:51下载
- 积分:1
-
Beginning-iPhone-Dev
iphone3开发基础教程中的例子,对初学者相当有用。主要使用interface builder进行界面开发。(The iphone3 develop basic tutorial example, useful for beginners. Main interface builder interface development)
- 2012-09-16 20:43:32下载
- 积分:1