亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

hashes

  • This program dump password hashes from local or remote Windows NT/2000 machines. It prints them on

    This program dump password hashes from local or remote Windows NT/2000 machines. It prints them onto the screen in l0phtcrack format, or will write them to a file if desired.

    標簽: password machines program Windows

    上傳時間: 2014-01-15

    上傳用戶:a673761058

  • L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    標簽: cryptographic L0phtCrack hashes 操作系統

    上傳時間: 2014-01-16

    上傳用戶:ztj182002

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    標簽: Programming developers for important

    上傳時間: 2015-09-03

    上傳用戶:gundan

  • By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998

    By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon

    標簽: Christiansen Torkington published Edition

    上傳時間: 2014-02-20

    上傳用戶:yyq123456789

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2014-11-29

    上傳用戶:kr770906

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2015-09-03

    上傳用戶:lifangyuan12

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標簽: perceptual implementation algorithms fingerpr

    上傳時間: 2013-12-08

    上傳用戶:星仔

主站蜘蛛池模板: 陇南市| 化德县| 岫岩| 吉林省| 鹤山市| 潼南县| 吉林市| 久治县| 江阴市| 卢氏县| 四会市| 南皮县| 光泽县| 舞钢市| 盐山县| 临武县| 武陟县| 建宁县| 乐亭县| 遵义县| 游戏| 大关县| 武定县| 鸡东县| 资中县| 张家口市| 克拉玛依市| 阳东县| 恭城| 柯坪县| 玉门市| 永顺县| 南木林县| 北辰区| 景宁| 托克逊县| 通化市| 张北县| 阿坝县| 额尔古纳市| 吉木萨尔县|