搜索资源列表
一个声讯小姐的隐秘日记
- 欲望与理性的挣扎!不断地自欺和伪装,不断地付出与失去她们为了在繁华的都市生存并长期居留,日夜出卖自己甜美柔媚的嗓音,甚至不惜肉体,可最后除了身心疲惫,伤痕累累外,沦为被整个社会鄙视的“罂粟花”…… - Desire and rational struggling! Unceasingly deceives self with the camouflage, unceasingly pays with loses them for in
Hacker Defender 1[1].0.0源代码
- Hacker Defender 1.0.0 内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。该后门技术允许植入Redirector。鉴于参数过多,不推荐新手使用。-Hacker Defender 1.0.0 kernel-level backdoo
文件夹保护
- vb 文件夹伪装,可以把文件夹伪装成打印机、网页等。-vb folder camouflage folder can be disguised as printers, web pages.
Delphi版*彩衣
- *彩衣,delphi版本的,可以用来伪装*-Trojan coat, delphi version can be used to camouflage Trojan
httptunnel-3.0.5
- 把所有的数据伪装成http数据传输,专门穿越防火墙。-put all the data into a camouflage http data transmission, through specialized firewall.
IP002
- 实现本机上网IP地址的伪装,是个不错的软件-achievement of the Internet IP addresses for the camouflage is a good software
weizhuang
- 很多下位机程序员都有这样的经历,在交付工程的时候对方要求提供源程序,而大多数下位机程序员都知道交出源程序是意味着什么,所以为了保护各位下位机程序员的合法利益.这个工具,伪装过后的源程序可以编译通过。-many lower computer programmers have the same experience that the delivery of the other works on the request source, and
VCpretender
- 伪装VC,通过修改PE头 呵呵 比较简单。主要是通过它PE结构-camouflage VC, by modifying the first PE Oh relatively simple. It is mainly through structural PE
Myshpzhzhwzh
- 我自己做的 大家多提宝贵意见啊 伪装分队决策支持系统 -I myself do you more valuable views ah camouflage detachments decision support system
PIPMasq
- IP伪装程序,可以作为内部局域网上网的网关。使用到了WPCapSrc-IP camouflage procedures, can be used as the internal LAN access to the Internet gateway. The use of the WPCapSrc
imagehide
- 直接4bit替换法的图像伪装技术以及对第四bit考察的matlab代码,其中需要两幅大小一样的图像-Direct 4bit image replacement method camouflage technologies, as well as inspection of the fourth bit of matlab code, one of two required size images
camouflage
- AutoIt脚本,功能用于伪装文件夹,防止别人正常访问。-AutoIt scr ipt, function for camouflage folder to prevent other people of normal visit.
JSPSecurity
- 这里要讨论的是JSP 环境下的安全管理问题, 将讨论恶意的用户输入伪装自身以及改变应用预定行为的各种方 法, 考虑如何检验输入合法性以及减少对信息和应用接口的不受欢迎的探测。-Here is the JSP to discuss the safety of environment management, will discuss the malicious user input, as well as changes in the
camouflage_ga
- Camouflage evolution simulation with Genetic algorithm
paobing
- 在我方某前沿防守地域,敌人以一个炮排(含两门火炮)为单位对我方进行干扰和破坏.为躲避我方打击,敌方对其阵地进行了伪装并经常变换射击地点. 经过长期观察发现,我方指挥所对敌方目标的指示有50%是准确的,而我方火力单位,在指示正确时,有1/3的射击效果能毁伤敌人一门火炮,有1/6的射击效果能全部毁伤敌人火炮. 现在希望能用某种方式把我方将要对敌人实施的20次打击结果显现出来,确定有效射击的比率及毁伤敌方火炮的平均值。 使用
camouflage
- Compress and decompress image file
hidelsb
- 基于图片的信息的隐藏与伪装,可以修改里面的参数使得其更好-Image-based information hiding and camouflage, you can change the parameters makes it better
Folder-camouflage
- 通过Desktop.ini来改变文件夹的属性,从而来达到伪装的效果-Desktop.ini to change the properties of the folder, so as to achieve the camouflage effect
labviewencryption-camouflage
- 基于虚拟仪器的labview的加密伪装程序-Encryption-based virtual instruments labview camouflage program
Design-of-Camouflage-Pattern
- 针对雪地、城市和丛林三种环境设计出适用于三种环境的数码迷彩服图案。-For snow, urban and jungle three environments designed to apply to the three environments of digital camouflage pattern.