-
-
MP3Stego_GUI.zip
... might be used as a watermarking system for MP3 files. Any opponent can
uncompress the bit stream and recompress it this will delete the hidden
information -- actually this is the only attack we know yet -- but at the
expense of severe quality loss.
-
-
-
SecurityConsiderationsforNetworkAttacks.rar
... these attacks generate large volumes of TCP/IP traffic. Commonly the targeted site may seem unavailable to the broader Internet because of the saturation of its network segment. Internally, however, the web servers may hardly seem affected by the attack
-
malicious.tar.gz
Malicious Cryptography. Excellent book on how to write cryptographic virii to attack systems. Malicious uses of cryptography.
-
SIRB.rar
... bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight. In this model, a bird ...
-
BiologicalRobot.rar
...
simulation and a robotic prototype based on the
dynamics of a robotic bird. The study analyze the wing angle
of attack and the velocity of the bird, the tail influence,
the gliding flight and the flapping flight with different
strategies and ...
-
Linux.Firewalls.rar
[Linux防火墙].(Linux.Firewalls.Attack.Detection.and.Response.with.iptables,.psad,.and.fwsnort)(美)拉什.中文高清PDF版.pdf
-
-
-