搜索结果
找到约 14 项符合
attack 的查询结果
按分类筛选
其他书籍 本文挡主要探讨一些web代码安全里比较隐秘
本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题.
主要内容:
二次攻击[Second attack]
类型1:通过文件系统函数漏洞转换
类型2:通过SQL注射漏洞转换
类型3:通过正则表达式中转变量
类型4:通过编码/解码中转变量
数组变量的魅力
Code与系统
Code与http协议
漏洞挖掘 ...
游戏 西工大程序设计大赛作品 拿出来与大家分享 含完整工作日记 历史备分 源代码及注释 RPG(role-playing game,角色扮演类游戏) 战斗用菜单操作:一级菜单有两项
西工大程序设计大赛作品
拿出来与大家分享
含完整工作日记 历史备分 源代码及注释
RPG(role-playing game,角色扮演类游戏)
战斗用菜单操作:一级菜单有两项,attack(一般攻击),magic(使用魔法);当选magic后会出现第二级菜单,heal(治疗),magicattack(魔法攻击)。 ...
其他 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
嵌入式/单片机编程 An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized
An Overview of Smart Card Security.
The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it d ...