fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas. fwknop implements network access controls (via iptables) based on a flexible port knocking mini-language, but with a twist it combines port knocking and passive operating system fingerprinting to make it possible to do things like only allow, say, Linux-2.4/2.6 systems to connect to your SSH daemon. fwknop supports shared, multi-protocol port knock sequences Along with both relative and absolute timeouts, and coded port knock sequences encrypted with the Rijndael block cipher.
標簽: Firewall Operator software upcoming
上傳時間: 2016-12-04
上傳用戶:牛津鞋
This tutorial white-paper illustrates practical aspects of FIR filter design and fixed-point implementation Along with the algorithms available in the Filter Design Toolbox and the Signal Processing Toolbox for this purpose.
標簽: illustrates fixed-point white-paper practical
上傳時間: 2016-12-14
上傳用戶:15071087253
Quartz is a full-featured, open source job scheduling system that can be integrated with, or used Along side virtually any J2EE or J2SE application - from the smallest stand-alone application to the largest e-commerce system. Quartz can be used to create simple or complex schedules for executing tens, hundreds, or even tens-of-thousands of jobs jobs whose tasks are defined as standard Java components or EJBs. The Quartz Scheduler includes many enterprise-class features, such as JTA transactions and clustering.
標簽: full-featured integrated scheduling Quartz
上傳時間: 2014-01-07
上傳用戶:龍飛艇
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file Along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file Along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789
Mantis - a php based bugtracking system Copyright [C] 2000 - 2002 Kenzaburo Ito - kenito@300baud.orgCopyright [C] 2002 - 2007 Mantis Team- mantisbt-lists.sourceforge.netMantis is free software: you can redistribute it and/or modifyit under the terms of the GNU General Public License as published by the Free Software Foundation, either version 2 of the License, orMantis is distributed in the hope that it will be useful,but WITHOUT ANY WARRANTY without even the implied warranty ofGNU General ublic License for more details.You should have receied a copy of the GNU General Public License Along with Mantis.
標簽: bugtracking Copyright Kenzaburo Mantis
上傳時間: 2017-03-22
上傳用戶:hwl453472107
Mantis - a php based bugtracking system Copyright [C] 2000 - 2002 Kenzaburo Ito - kenito@300baud.orgCopyright [C] 2002 - 2007 Mantis Team- mantisbt-lists.sourceforge.netMantis is free software: you can redistribute it and/or modifyit under the terms of the GNU General Public License as published by the Free Software Foundation, either version 2 of the License, orMantis is distributed in the hope that it will be useful,but WITHOUT ANY WARRANTY without even the implied warranty ofGNU General ublic License for more details.You should have receied a copy of the GNU General Public License Along with Mantis.
標簽: bugtracking Copyright Kenzaburo Mantis
上傳時間: 2013-12-02
上傳用戶:hxy200501
.NET Remoting is very important in distributed environments. This book essentially deals with the core concepts of .NET remoting Along with some working examples. A must read.
標簽: environments distributed essentially important
上傳時間: 2014-01-18
上傳用戶:familiarsmile
We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity Along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.
標簽: distribution dimensional transport obtained
上傳時間: 2013-12-19
上傳用戶:zhliu007
This gorgeous, full-color book will guide you through the complete design process, from getting inspiration and sketching ideas out, through to choosing a color scheme, designing the layout, and selecting effective imagery. Throughout, the focus is on simple and practical techniques that anyone can use 鈥?you don鈥檛 need to have gone to art school or have artistic flair to create stunning designs using the methods outlined in this book. You鈥檒l follow Along as author and design guru Jason Beaird creates a complete web site layout using the techniques that you鈥檝e learned. The book鈥檚 full-color layout and large format (8鈥?x 10鈥? make The Principles Of Beautiful Wed Design a pleasure to read.
標簽: full-color gorgeous complete getting
上傳時間: 2017-05-08
上傳用戶:2404