Search in more than 2760000 codes/documents:
 [ ddos  delphi  snort  RSA  WORM  ipsec  virus  vb  OpenSSL  snort-2.8.1.rar  vpn  hacker  java  Linux  IDS  ATTACK  PE  exploit  hack  freeswan  windows  ns2  md5  MANET  NBDDOS  ddos detection  syn ]
[Network Security] Total: 2602 | <<First  <Previous  Next>  Last>>  Page: 75/87  

2221. gsm_security.rar

<shixw_110> uploading at 2006-06-21 18:56:16
Describe: on GSM security articles, helpful for the development of GSM,
Plat: Visual C++ | Size: 153KB | Downloads:16

2222. cast1.rar

<shixw_110> uploading at 2006-06-21 18:48:44
Describe: this a code with the name of cast. It can he lp you in improving the knowledge of crytograph y,
Plat: Visual C++ | Size: 2537KB | Downloads:4

2223. 060621anquan.rar

<sunwei4616> uploading at 2006-06-21 14:04:00
Describe: Security Toolkit There are a lot of security tools and practical software
Plat: Visual C++ | Size: 28924KB | Downloads:486

2224. jsjanquan.rar

<zhoufazhi226> uploading at 2006-06-14 21:52:01
Describe: recent years, Internet technology matures. have started from and to provide network connectivity to ensure that the main aim of the first generation of Internet technology to provide network data information services to the characteristics of the second-generation Internet technology transition.
Plat: Others | Size: 18KB | Downloads:3

2225. wangluojiancemingling.txt.rar

<qqxiaoyy> uploading at 2006-06-06 16:31:47
Describe: order skilled hope we can use these orders
Plat: DOS | Size: 2KB | Downloads:6

2226. FEAL8.zip

<xiaoyao19840721> uploading at 2006-06-05 21:01:10
Describe: the FEAL8 round of the iterative requirements of the dense 64-C and 64 K after the key to the solution design running close access to the 64 P explicit. As the two-band input and output of the median long inconvenient, and then process the data using a large number of computations 16 band. Operational data in the process often imported data divided into equal portions, in data processing using an array form. FEAL algorithm three basic computing function is the focus of the whole process, Key handling procedures and decryption process of the three operations will function as the center, therefore, procedures designed to S Function and f function to commence further prepared by the main function calls the three functions.
Plat: C-C++ | Size: 2KB | Downloads:18

2227. RC6jiamijiemi.rar

<hanerhai> uploading at 2006-06-04 18:54:47
Describe: communications technology, password, RC6 source, it is necessary to look at it
Plat: Visual C++ | Size: 13KB | Downloads:40

2228. twofish12345.zip

<hanerhai> uploading at 2006-06-04 18:44:45
Describe: network security and data encryption, decryption technology, a true realization of the procedure
Plat: Visual C++ | Size: 105KB | Downloads:42

2229. safety.rar

<zhulimin131421> uploading at 2006-05-24 23:20:03
Describe: information network security program (computer security thesis : designing an information network security solutions).
Plat: Others | Size: 8KB | Downloads:122

2230. 1852_CGFTP.zip

<qwe5184> uploading at 2006-05-18 20:53:05
Describe: ftpCLIENTS this program is a complete FTP client, application vb completed, simple code.- Visual Basic
Plat: Visual Basic | Size: 20KB | Downloads:14

2231. MS05018.rar

<lglgyr521> uploading at 2006-05-05 18:50:53
Describe: mso5018_csRss out procedures and FOSS
Plat: Asm | Size: 28KB | Downloads:10

2232. simpleRSA.rar

<zhouchongqing> uploading at 2006-05-02 13:58:44
Describe: achieved using RSA data encryption and decryption. This encryption method is SSH stabbed inside the
Plat: Visual C++ | Size: 2KB | Downloads:29

2233. LenovoLogAgent.rar

<Yanjia.Zhang> uploading at 2006-04-27 11:05:26
Describe: software to the Windows event log sent to a designated host, so in the long-range computer security incidents of View. using UDP transmission mode; the event log format of the transmission standard syslog format; this will be the Windows service every one minute Sending a minute before the update event log.
Plat: C# | Size: 262KB | Downloads:34

2234. shenfenyanzheng.rar

<ekinyangdn> uploading at 2006-04-20 19:43:12
Describe: identity verification system before you use directory should include the config.inc. php files with your mainframe configuration. Ask a database known as the user table. You can create their own, the following code can be copied directly into phpmyadmin implementation. Create table user (id bigint unsigned default 0 not null auto_increment, name varchar (30), password varchar (30), email varchar (30), primary key (id)) for which you want to encrypt pages on the first page (
Plat: PHP | Size: 9KB | Downloads:5

2235. staticKey.rar

<abcdctrabcd> uploading at 2006-04-18 22:11:45
Describe: linux/unix, be used to manage the encryption and decryption keys C
Plat: C-C++ | Size: 2KB | Downloads:6

2236. staticDb.rar

<abcdctrabcd> uploading at 2006-04-18 22:10:41
Describe: unix/linux under the ORACLE database for connecting a very handy C
Plat: C++ | Size: 2KB | Downloads:23

2237. staticAes.rar

<abcdctrabcd> uploading at 2006-04-18 22:08:42
Describe: unix/linux under static password for the encryption algorithm AES file encryption standards
Plat: C-C++ | Size: 8KB | Downloads:14

2238. MD5_zka.rar

<zhao-k04> uploading at 2006-04-17 11:35:48
Describe: MD5 encryption algorithm, using standard C completed, in UNIX systems make the implementation run. code can be amended.
Plat: Unix_Linux | Size: 23KB | Downloads:13

2239. FiveKinds.rar

<ywang_0829> uploading at 2006-04-14 13:46:20
Describe: apache exploit, ie exploit, win 2000 xp task scheduler exploit, and generate the linux x86 Shellcode and the latest source code sql overflow
Plat: C-C++ | Size: 10KB | Downloads:11

2240. MD5CSharp11.rar

<jqwu84> uploading at 2006-04-12 15:22:04
Describe: information security md5 algorithm, simple and friendly user interface, document encryption
Plat: C# | Size: 39KB | Downloads:237

2241. DesCSharp11.rar

<jqwu84> uploading at 2006-04-12 15:20:22
Describe: information security des algorithm, the document encryption and decryption
Plat: C# | Size: 48KB | Downloads:271

2242. main_ddos.rar

<lu-ping-yin> uploading at 2006-04-06 17:20:40
Describe: this program is to use network technology to improve the procedures DDoS attacks
Plat: Visual C++ | Size: 2263KB | Downloads:144

2243. Library_of_Cryptographic.rar

<mousegeng> uploading at 2006-04-04 14:38:46
Describe: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Plat: C++ | Size: 379KB | Downloads:224

2244. manganment.rar

<thankyou163> uploading at 2006-03-31 10:15:44
Describe: this document is on the improvement of security and LAN management, and enable you to more effectively manage their networks.
Plat: CHM | Size: 20KB | Downloads:7

2245. aaffujhyigdsdfrdh.rar

<rebecca_Dan> uploading at 2006-03-30 23:01:40
Describe: Whirlpool algorithm was included in the ISO standard. This is mainly because of their strong safety. First, the use of the Whirlpool and AES encryption standard into the same technology, only the use of AES module functions : f (x) = x ^ x ^ 8 x 4 x 1 ^ 3, 0x11B; Whirlpool and the use of : f (x) = 8 x ^ x ^ 4 x ^ x ^ 2 3 1 that 0x11D. The second point, Whirlpool is the output of 512. To speed up the computing speed, Whirlpool use all forms have a good time basis. Whirlpool in history, a total of three versions, according to the latest 2003 edition, we present the algorithm called Whirlpool Whirlpool 3.0. Following is the specific implementation of the code.
Plat: C-C++ | Size: 11KB | Downloads:27

2246. Soft20060215100246568.rar

<xcl3427> uploading at 2006-03-28 17:32:27
Describe: use a java achieve Des source encryption and decryption procedures.
Plat: Java | Size: 38KB | Downloads:24

2247. my_os_memory.rar

<camopel> uploading at 2006-03-27 22:08:43
Describe: simulation operating system memory mechanism completed a memory management system
Plat: Visual C++ | Size: 9KB | Downloads:21

2248. fasttobeahacherchm.rar

<microbie3> uploading at 2006-03-27 13:14:32
Describe: you look at the benefits of fixed okay see more, learn less games not at the expense
Plat: MultiPlatform | Size: 1112KB | Downloads:8

2249. fakeap-0[1].3.1.Tar.gz

<hu_jianwei> uploading at 2006-03-24 00:32:40
Describe: Perl language for forged wireless network access point source procedures.
Plat: Perl | Size: 171KB | Downloads:5

2250. zimutongji.rar

<liqijie820> uploading at 2006-03-22 19:41:20
Describe: This is a letter of the alphabet or group statistical probability of simple procedures can be run.
Plat: Visual C++ | Size: 1KB | Downloads:7
[Network Security] Total 2602 | <<First  <Previous  Next>  Last>>  Page: 75/87