-
This example is the dynamic control with a tree display of all the computer netw...
本实例是用一个树型控件动态的显示了所有流经本计算机的网络封包。-This example is the dynamic control with a tree display of all the computer network through the packet.
- 2022-03-04 02:41:53下载
- 积分:1
-
局域网内IP扫描,扫描局域网内的计算机IP地址,请根据实际修改里面相应的地方。...
局域网内IP扫描,扫描局域网内的计算机IP地址,请根据实际修改里面相应的地方。-LAN IP scanning computer LAN IP address, Please actual changes inside the corresponding areas.
- 2022-08-16 11:19:43下载
- 积分:1
-
这是一个基于UDP协议的网段扫描程序,Vc++开发,希望给予提供大家学习vc的帮助...
这是一个基于UDP协议的网段扫描程序,Vc++开发,希望给予提供大家学习vc的帮助-This is a UDP-based network of scanning procedures, Vc development, giving hope to emulate the help vc
- 2022-06-28 09:03:03下载
- 积分:1
-
遥控接收器子程序,适合于电视,PDA,DVD等
遥控接收器子程序,适合于电视,PDA,DVD等-Remote Control Receiver subroutine, suitable for television, PDA, DVD, etc.
- 2022-07-07 04:21:51下载
- 积分:1
-
VB write port scanners
VB写的端口扫描器-VB write port scanners
- 2022-08-07 03:34:13下载
- 积分:1
-
内存占用的大小直接影响程序的运行,对于一些内存占用很多的程序,需要实时检测可用内存,以调整设置,本程序就能实现这种功能...
内存占用的大小直接影响程序的运行,对于一些内存占用很多的程序,需要实时检测可用内存,以调整设置,本程序就能实现这种功能-Memory footprint size of a direct impact on the operation of the procedure, for some memory footprint a lot of procedures, the need for real-time detection of memory can be used to adjust the settings, the program will be able to realize this function
- 2023-07-03 21:25:03下载
- 积分:1
-
通过发送自己构造的数据包来检测端口是否可以连接
通过发送自己构造的数据包来检测端口是否可以连接 -Detecting the port whether can be connected through sending the your own packets
- 2023-06-27 03:35:03下载
- 积分:1
-
nmap为一著名的网络安全扫描工具,中文版参考手册,来自官方的文档...
nmap为一著名的网络安全扫描工具,中文版参考手册,来自官方的文档-nmap is a well-known network security scanning tools, the Chinese version of Reference Manual, from the official documents
- 2023-03-31 15:35:04下载
- 积分:1
-
The preparation of vulnerability scanners detect a remote server that may exist...
编写漏洞扫描器探查远程服务器上可能存在的具有安全隐患的文件是否存在,它的socket建立过程和上面 的端口扫描器是相同的,所不同的是漏洞扫描器通常使用80端口,然后对这个端口发送一个GET文件的请求,服务器接收到请求会返回文件内容,如果文件不存 在则返回一个错误提示,通过接收返回内容可以判断文件是否存在。发送和接收数据需要使用函数send()和recv(),另外对流中存在的字符串进行判断 需要使用函数strstr(),这除了需要具备socket函数库的知识以外,还需要一些有关string函数库的知识。-The preparation of vulnerability scanners detect a remote server that may exist with the security risks of the file exists, and its socket to establish the process and above the port scanner is the same, the difference is that vulnerability scanners typically use port 80, and then on the port send a GET request for the document, the server receives the request will return the contents of the documents, if the file does not exist then return an error message, through the receiver can determine whether to return to the contents of the file exists. Send and receive data need to use the function send () and recv (), exists in another string convection judge need to use the function strstr (), which apart from the need to have the socket lib
- 2022-06-21 10:00:53下载
- 积分:1
-
用于在入侵前收集信息的扫描软件,能够得到对方主机开放哪些端口...
用于在入侵前收集信息的扫描软件,能够得到对方主机开放哪些端口-used in the collection of information before the invasion of scanning software to be open what other host ports
- 2022-01-26 05:03:02下载
- 积分:1