-
CCTT,“隐蔽通道隧道的工具”
Cctt, "Covert Channel Tunneling Tool" - 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。-Cctt, "Covert Channel Tunneling Tool"- the name implies, this is a hidden channel tools. He provided several possible ways to achieve has been allowed in the network access control system authorized by the data flow on the creation and establishment of arbitrary data stream transmission channels.
- 2022-03-20 17:25:48下载
- 积分:1
-
zigbee与GPRS的结合,实现无线数据通信
zigbee与GPRS的结合,实现无线数据通信-zigbee with a combination of GPRS, wireless data communications
- 2022-02-07 22:51:23下载
- 积分:1
-
这是一个linux下监控vpn状态的程序,可以实时监控vpn隧道当前状态信息,包括(协商密钥,传输数据统计等)...
这是一个linux下监控vpn状态的程序,可以实时监控vpn隧道当前状态信息,包括(协商密钥,传输数据统计等)-This is a linux VPN under state control procedures, Real-time monitoring can VPN tunnel current state of information, including (key consultations, the data transmission, etc.)
- 2022-02-25 09:46:30下载
- 积分:1
-
一个网络蜘蛛的经典代码,可与运行java环紧,与平台无关
一个网络蜘蛛的经典代码,可与运行java环紧,与平台无关-a network of the classic Spider code can be run in Central java tight, with the platform-independent
- 2022-02-05 13:06:50下载
- 积分:1
-
DDNS 很好的参考源码,可以让大家参考,
改改就可以用,自持很多网址的...
DDNS 很好的参考源码,可以让大家参考,
改改就可以用,自持很多网址的-DDNS good reference source, allowing everyone a reference can be changed, and exercise self-restraint, a lot of web sites
- 2023-05-05 05:55:03下载
- 积分:1
-
解析英国简介1.05/1.06对象轮播和保存文件到磁盘(所有
Parses UK Profile 1.05/1.06 Object Carousel and saves files to disk (all
stored under /tmp/cache at the moment). The files are the scripts and
text/image data for MHEG5, the interactive(ish) element of digital TV. At
the moment the MHEG scripts are not parsed, so to duplicate that
interactive experience, speedy usage of "cat" and "xv" is recommended.
- 2022-02-15 09:55:01下载
- 积分:1
-
ftam standard protocols, such as server and client source code.
ftam等标准协议服务器和客户端的源代码。-ftam standard protocols, such as server and client source code.
- 2023-04-09 09:00:03下载
- 积分:1
-
嵌入式WEB,cgi网页编程,这里提供几个很好学习案例
嵌入式WEB,cgi网页编程,这里提供几个很好学习案例-Embedded WEB, cgi web page programming, here are a few very good case study
- 2022-03-18 12:59:35下载
- 积分:1
-
* To protect our network from unauthorized users.
* Access permissions are al...
* To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.
-* To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.
- 2022-05-23 07:33:07下载
- 积分:1
-
基于NUCLEUS操作系统的网络编程NET原代码
基于NUCLEUS操作系统的网络编程NET原代码-NUCLEUS-based operating system, network programming NET source code
- 2022-04-15 10:37:57下载
- 积分:1