亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

hashes

  • This program dump password hashes from local or remote Windows NT/2000 machines. It prints them on

    This program dump password hashes from local or remote Windows NT/2000 machines. It prints them onto the screen in l0phtcrack format, or will write them to a file if desired.

    標簽: password machines program Windows

    上傳時間: 2014-01-15

    上傳用戶:a673761058

  • L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    L0phtCrack是在NT平臺上使用的口令審計工具。它能通過保存在NT操作系統中cryptographic hashes列表來破解用戶口令的。

    標簽: cryptographic L0phtCrack hashes 操作系統

    上傳時間: 2014-01-16

    上傳用戶:ztj182002

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    標簽: Programming developers for important

    上傳時間: 2015-09-03

    上傳用戶:gundan

  • By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998

    By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon

    標簽: Christiansen Torkington published Edition

    上傳時間: 2014-02-20

    上傳用戶:yyq123456789

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2014-11-29

    上傳用戶:kr770906

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    標簽: L. published Schwartz Edition

    上傳時間: 2015-09-03

    上傳用戶:lifangyuan12

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標簽: perceptual implementation algorithms fingerpr

    上傳時間: 2013-12-08

    上傳用戶:星仔

主站蜘蛛池模板: 华阴市| 航空| 青岛市| 郁南县| 伊吾县| 依安县| 诸城市| 广州市| 高陵县| 米易县| 邵武市| 梁平县| 巩留县| 宜宾市| 章丘市| 策勒县| 阳泉市| 科技| 邵阳市| 武平县| 禹州市| 涡阳县| 龙江县| 阳新县| 盐亭县| 永康市| 麻江县| 当阳市| 隆林| 古丈县| 临潭县| 奉新县| 麻栗坡县| 高邑县| 武汉市| 台北县| 若尔盖县| 通州区| 民权县| 乐至县| 林芝县|