-
xfilter20
防火墙源码,基于windows api开发的firewall(firewall source code)
- 2009-05-02 14:47:48下载
- 积分:1
-
XFILTER2_FOR_9X_2K_XP
说明: 费尔防火墙源代码.费尔个人防火墙 2.1 源程序包括 XFILTER.EXE, XFILTER.DLL, XPACKET.VXD ( 限于95/98/ME版 ) , XAPCKET.SYS ( 限于 2000/XP 版 )的源程序。此代码包中没有包含编译后的程序,要获得这些程序可以通过下载安装包得到。安装包是免费的,使用 ZIP 兼容的压缩方式,用 ZIP 工具解压。(请尊重代码作者的劳动,只供学习,勿用于商业用途。站长留)(Fil firewall source code. Fil Personal Firewall 2.1 include XFILTER.EXE source, XFILTER.DLL, XPACKET.VXD (95/98/ME limited edition), XAPCKET.SYS (only 2000/XP version) of the source. This code does not contain the compiled procedures to obtain these procedures can be downloaded installation package. Installation kits are free, the use of ZIP-compatible compression, decompression using ZIP tools.)
- 2006-04-26 15:49:44下载
- 积分:1
-
FirewallPApiSrc1.1
一个简单的防火墙程序( A simple firewall procedure )
- 2004-07-11 11:30:33下载
- 积分:1
-
151
真彩防火墙按钮源码,例程程序结合易语言模块彗星真彩控件模块.ec,实现真彩防火墙按钮效果。(TFT firewall button source , routine program combined with easy language module comet true color control module .ec, true-color firewall button effects .)
- 2016-08-23 02:24:41下载
- 积分:1
-
ScanPort_coder
Syn_ScanPort0 高速SYN端口扫描器的VC源代码(SYN port Syn_ScanPort0 high-speed scanner VC source code)
- 2007-12-24 20:11:33下载
- 积分:1
-
Firewall_Blocker
Enable / Disable Windows XP Firewall Through .Net Code, No Need API Functions, Read And Write As DWORD Values.
- 2010-03-14 02:58:32下载
- 积分:1
-
m0n0wall_handbook_chinese
m0n0wall防火墙嵌入式系统的中文手册(m0n0wall firewall Embedded System, the Chinese handbook)
- 2010-03-10 14:33:23下载
- 积分:1
-
67634
pysl-iPhone电话短信防火墙,精选ios编程学习源码,很好的参考资料。(Pysl-iPhone phone SMS firewall, selection of learning IOS programming source code, a good reference.)
- 2013-12-11 10:47:45下载
- 积分:1
-
Tripwire-1.3.1-1.tar
一个较好的多平台的防火墙程序 (A good multi-platform firewa)
- 2001-01-07 15:44:36下载
- 积分:1
-
PrinciplesofInformationSystemsSecurity
应用的角度介绍计算机信息系统安全原理,并将有关内容按照如下体系梳理:第1篇攻防技术:内容包括恶意程序、网络攻击(黑客)、隔离技术(防火墙、物理隔离和电磁防护)、安全监控(IDS、网络诱骗和审计)、紧急响应和取证;第2篇安全信任体系:内容包括加密与信息隐藏、认证、安全协议;第3篇安全体系结构和评估标准。
(Perspective on the application of computer information system security principles, and the contents sorted according to the following system: the first an offensive and defensive techniques: including malicious programs, network attacks (hackers), isolation technology (firewalls, physical isolation and electromagnetic protection), security monitoring (IDS, network trap and audit), emergency response and forensics No. 2 security trust system: the content includes encryption and information hiding, authentication, security protocols the first three security architecture and evaluation criteria.)
- 2009-12-21 12:42:49下载
- 积分:1