虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Attacks

  • A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network app

    A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications

    标签: document Possible protocol Attacks

    上传时间: 2013-12-10

    上传用户:洛木卓

  • 智能电网安全性

    Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseAttacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the Attacks.

    标签: 智能电网 安全性

    上传时间: 2013-10-27

    上传用户:tecman

  • 工业系统安全问题和解决办法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber Attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    标签: 工业系统 安全问题

    上传时间: 2013-10-08

    上传用户:woshinimiaoye

  • The Network Security Response Framework (NSRF) allows for testing different computer security respon

    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.

    标签: Framework different Security Response

    上传时间: 2013-12-03

    上传用户:ippler8

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system Attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。

    标签: introduces the hacking science

    上传时间: 2013-12-28

    上传用户:离殇

  • This code was used to produce simulation results described in: Using Directional Antennas to Pre

    This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.

    标签: Directional simulation described Antennas

    上传时间: 2014-12-06

    上传用户:xieguodong1234

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system Attacks. 我记得好像的关于缓冲区溢出的

    标签: introduces the hacking science

    上传时间: 2014-08-14

    上传用户:Breathe0125

  • Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

    Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of Attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.

    标签: Watermarking watermarking evaluation presented

    上传时间: 2013-12-04

    上传用户:thinode

  • Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat

    Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK Attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

    标签: keys Aircrack-ng cracking WPA-PSK

    上传时间: 2013-12-25

    上传用户:bruce

  • What you always wanted to know about networking but were afraid to ask! * How networks and the In

    What you always wanted to know about networking but were afraid to ask! * How networks and the Internet work * How to build coherent, cost-effective network infrastructures * How to design networks for maximum reliability and availability * What you need to know about data center and application networking * How to secure networks against today?s threats and Attacks * How to take advantage of the latest mobility technologies * How virtualizing networks can help businesses leverage their network investments even further * How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

    标签: networking networks always afraid

    上传时间: 2013-12-25

    上传用户:fandeshun