-
-
漂亮的ComponentArtWebUI及Demo源码
... interface technology in the industry.
Deepest ASP.NET AJAX Integration:
The first true controls to fully exploit the most advanced AJAX framework available.
Comprehensive Documentation and Support:
Featuring complete product documentation online and ...
-
Expert Oracle Database Architecture 3rd
... : "you can treat Oracle as a black box and just stick data into it, or you can understand how it works and exploit it as a powerful computing environment." If you choose the latter, then you’ll find that there are few information management ...
-
-
Learn iOS 8 App Development%2C 2nd Edition-Apress%282014%29
... SDK, but few explain how to develop apps optimally and soundly. This book teaches both core Swift language concepts and how to exploit design patterns and logic with the iOS SDK, based on Swift and the Cocoa Touch framework.
Why spend months or years ...
-
Wiley.Big.Data.Revolution.1118943716
Big Data Revolution: What farmers, doctors and insurance agents teach us about discovering big data patterns
Exploit the power and potential of Big Data to revolutionize business outcomes
Big Data Revolution is a guide to improving performance, making ...
-
Metasploit渗透测试指南(完整版).pdf[带书签]
... 阶段 4
1.2 渗透测试类型 4
1.2.1 白盒测试 5
1.2.2 黑盒测试 5
1.3 漏洞扫描器 5
1.4 小结 6
第2章 Metasploit基础 7
2.1 专业术语 7
2.1.1 渗透攻击(Exploit) 8
2.1.2 攻击载荷(Payload) 8
2.1.3 Shellcode 8
2.1.4 模块(Module) 8
2.1.5 监听器(Listener) 8
2.2 Metasploit用户接口 8
2.2.1 MSF终端 9
2.2.2 ...
-
-
免杀版NC(netcat)
... ;等等命令功能更强大......)。
高级用法:
6)作攻击程序用,例子:
格式1:type.exe c:\exploit.txt|nc -nvv 192.168.x.x 80
格式2:nc-nvv192.168.x.x80
讲解:连接到192.168.x.x ... 'c:\ex ploit.txt'的内容(两种格式确有相同的效果, 真是有异曲同工之妙:P)
附:'c:\exploit.txt'为shellcode等 7)作蜜罐用[1],例子: 格式:nc -L -p 80 讲解:使用'-L'(注意 ...
-
Csharp.Multithreaded.and.Parallel.Programming
... . Using multiple cores means your applications can process data faster and be more responsive to users. However, to fully exploit this in your applications, you need to write multithreading code.
We will begin by covering some techniques that have been ...
-
黑客防线2013年04期杂志
... 亮)
Android平台下的WIFI流量转储(顽石)
基于ARM平台的EXPLOIT研究(秦妮)
Android图形锁破解(修炼中的柳柳)
-