The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
資源簡介:the tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. the tool connect to the remote host, and compares the reply to several known replies. the rootkits that can be dete...
上傳時間: 2016-02-21
上傳用戶:gundan
資源簡介:an approach for capturing similarity between words that was concerned with the syntactic similarity of two strings. Today we are back to discuss another approach that is more concerned with the meaning of words. Semantic similarity is a con...
上傳時間: 2014-01-05
上傳用戶:wmwai1314
資源簡介:the first decision, that has to be made for the AVR platform, is to select the development environment you want to use, either ImageCraft s ICCAVR or GNU s AVR-GCC. the commercial ImageCraft Compiler offers an advanced IDE and is the fir...
上傳時間: 2017-04-21
上傳用戶:從此走出陰霾
資源簡介:Radio frequency identifi cation (RFID) technology is a wireless communication technology that enables users to uniquely identify tagged objects or people. RFID is rapidly becoming a cost-effective technology. This is in large part due to th...
上傳時間: 2020-06-08
上傳用戶:shancjb
資源簡介:the famous tool used to detect the memory leak
上傳時間: 2015-06-24
上傳用戶:talenthn
資源簡介:Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth exa...
上傳時間: 2014-01-02
上傳用戶:Late_Li
資源簡介:To detect the face from any gray image
上傳時間: 2014-01-14
上傳用戶:lvzhr
資源簡介:To detect the face from the image
上傳時間: 2017-08-24
上傳用戶:hebmuljb
資源簡介:MemCheck Driver Memory Tool the MemCheck code is designed to provide Windows NT/2K/XP driver developers with a tool to help in the detection of the following memory handling issues: Buffer overrun Buffer corruption Buffer use after buffer r...
上傳時間: 2014-12-05
上傳用戶:weiwolkt
資源簡介:this program is used to detect the corner of image
上傳時間: 2015-06-13
上傳用戶:SimonQQ
資源簡介:TrainReset:there are many trains need to drive out of the station .In terms of their numbers from small to large.there are only three railways used to place the trains ,and also need the same order.
上傳時間: 2015-07-04
上傳用戶:moerwang
資源簡介:This program provides an example of how to configure the C8051F02x device to operate from an external 22.1184MHz crystal attached to the XTAL1 andXTAL2 pins. Also enables Missing Clock Detector.
上傳時間: 2014-01-09
上傳用戶:1079836864
資源簡介:From the Publisher Focus on 2D in Direct3D? teaches you all of the tools and tips you ll need to dive right in and begin creating your own games. If you have some knowledge of C or C++ and have been searching for a guide that will take you...
上傳時間: 2015-09-01
上傳用戶:ve3344
資源簡介:When I use opencv, I use this very useful paper to begin the study. This is all I searched from the internet informations.
上傳時間: 2014-01-12
上傳用戶:lht618
資源簡介:This designs uses a Nios II system to demonstrate how to read from the SD card. the software reads WAV files from the SD card and plays it through the LINE OUT line. Simply put a SD card into the slot on the board and connect some speakers ...
上傳時間: 2015-10-26
上傳用戶:lizhen9880
資源簡介:This program allows reading or writing values to and from the DSP through hyperterminal serial port interface.
上傳時間: 2014-01-19
上傳用戶:gyq
資源簡介:the algorith divides rows in to four equal groups. the rows are then used to from a distance graph which is then transformed into a matrix. girth of eight is maintained by avoiding six-cycles in the graph construction
上傳時間: 2014-01-15
上傳用戶:kelimu
資源簡介:// chebysheve outlier detection // this function is used to detect the abnormal value among a set of data // input: // delta: a set of data // flag: discribe which data is already known as outlier // p: restrict level // output: // ...
上傳時間: 2013-11-30
上傳用戶:13517191407
資源簡介:using 18b20 to detect the temp,and show it o
上傳時間: 2013-11-29
上傳用戶:410805624
資源簡介:this a user-mode application to detect device change on the system, i.e. plug-in a USB drive, iPod, USB wireless network card, etc.
上傳時間: 2014-01-05
上傳用戶:lmeeworm
資源簡介:All the tool for build a network able to reconize any shapes. Very complete, a good base for anything you want to do whith acknowledge, and neural network
上傳時間: 2017-03-09
上傳用戶:qq21508895
資源簡介:the example that shows how to use int2e trick to use ZwSetInformationThread to hide from ring3 debuggers
上傳時間: 2014-12-05
上傳用戶:181992417
資源簡介:This is Sybase book. Let me know the feedback after reading this book. Good to hear from you. Bye
上傳時間: 2013-12-17
上傳用戶:shus521
資源簡介:Program Description: the program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exi...
上傳時間: 2017-04-08
上傳用戶:磊子226
資源簡介:THIS DOCUMENT IS PROVIDED TO the USER AS IS . Etc.etc. Data from HITACHI LIQUID CRYSTAL CHARACTER DISPLAY MODULE and OPTREX DOT MATRIX LCD MODULE databooks
上傳時間: 2013-12-16
上傳用戶:yuchunhai1990
資源簡介:face detector to detect face area in the given image
上傳時間: 2014-01-01
上傳用戶:2404
資源簡介:the material contains all aspects of game creation. From the design in UML up to main requirements.
上傳時間: 2013-12-23
上傳用戶:xiaohuanhuan
資源簡介:Advanced PIC Microcontroller Projects in C from USB to RTOS with the PIC18F Series (Ebook)
上傳時間: 2013-12-20
上傳用戶:banyou
資源簡介:book abt Advanced PIC microcontroller projects in C from USB to ZIGBEE with the pic 18F series
上傳時間: 2017-08-08
上傳用戶:cxl274287265
資源簡介:This code is used to detect the face
上傳時間: 2013-12-11
上傳用戶:daguda