Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - worm
Search - worm - List
Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
Update : 2024-05-19 Size : 1523712 Publisher : whr

J2MEsnake
DL : 0
贪吃蛇手机游戏 贪吃蛇是一款非常经典的手机游戏,本文将使用MIDP实现这款著名的游戏。首先我将介绍下主要用到的七个类:    WormMain:最主要的类,控制所有其它类的运行和销毁。    WormPit:处理键盘输入事件并实例化Worm类和WormFood类的。    Worm:抽象了贪吃蛇的属性和动作    WormFood:抽象了食物的属性和动作    WormScore:用来纪录分数的类    WormLink:抽象了蛇身上的一段,保存了这段的坐标、方向和所有状态。    WormException:处理异常类-Snake mobile game Snake is a very classic cell phone game, this paper will use the MIDP realize this famous game. First of all, I will introduce the main use of the seven categories: WormMain: the most important category, controlling for all other types of running and destroyed. WormPit: handle keyboard input events and Worm instantiated class and WormFood category. Worm: abstract properties of the Snake and movements WormFood: abstract properties of food and movement WormScore: the class used to record scores WormLink: abstract section of the snake body, preserved during the coordinates, direction and all states. WormException: handle exception classes
Update : 2024-05-19 Size : 4096 Publisher : weat

DL : 0
书名:捉虫历险记。收集了编程中容易出错的地方-Title: Adventure to catch the worm. Collection of programming error-prone areas
Update : 2024-05-19 Size : 514048 Publisher : luokunyuan

DL : 0
蠕虫病毒源代码,实现的功能大家有目的一共睹-Worm source code, to achieve the purpose of the function has a total of U.S. to see
Update : 2024-05-19 Size : 15360 Publisher : hongjun

局部综合原理设计锥齿轮\弧齿锥齿轮设计正式计算文件\几何参数计算(一).rar-Integrated Principles of design of partial bevel gear spiral bevel gear design document formally calculated the geometric parameters (1). Rar
Update : 2024-05-19 Size : 3072 Publisher : leinan

黑色技术蠕虫下载者[完整源码] 作者:教主 信息来源:邪恶八进制信息安全团队(www.eviloctal.com) 作者网站:黑色技术 www.Rootkit.com.cn 公开源码用于编程交流。利用此代码修改或传播与作者无任何关系。 -Black technology that those who download the worm [complete source] Author: guru information sources: the evil octal information security team (www.eviloctal.com) Author Web site: black www.Rootkit.com.cn open-source technology for the exchange program. Use this code to modify or dissemination without any relationship with the author.
Update : 2024-05-19 Size : 3134464 Publisher : wpxtc

* While the first-run condition of a worm or virus exploits a long-running * * security hole in Microsoft Internet Explorer, they all need to create * * entries in the registry to run again the next time your PC starts. Most * * variants will either place random entries in the xxx\Runxxx nodes of the * * machine or current user, while other more sophisticated families make use * * of Browser Helper Objects (BHOs) that run when Windows Explorer starts. * * While notable portions of the registry are locked, however, those * * applications can not be fully registered, and as a result, will fail to * * load as desired by the author. Using this form of protection, then, you *-* While the first-run condition of a worm or virus exploits a long-running * * security hole in Microsoft Internet Explorer, they all need to create * * entries in the registry to run again the next time your PC starts. Most * * variants will either place random entries in the xxx\Runxxx nodes of the * * machine or current user, while other more sophisticated families make use * * of Browser Helper Objects (BHOs) that run when Windows Explorer starts. * * While notable portions of the registry are locked, however, those * * applications can not be fully registered, and as a result, will fail to * * load as desired by the author. Using this form of protection, then, you *
Update : 2024-05-19 Size : 1024 Publisher : jensinx

DL : 0
震荡波病毒用C语言实现的详细源代码。该病毒为I-Worm/Sasser.a的第三方改造版本-Sasser virus using C language implementation of the detailed source code
Update : 2024-05-19 Size : 4096 Publisher : 王博

DL : 0
win32.another.b by kefi a file-sharing worm written in tasm second generation of win32.another.a-win32.another.b by kefi a file-sharing worm written in tasm second generation of win32.another.a
Update : 2024-05-19 Size : 6144 Publisher : fnord

DL : 0
win32.another.a by kefi file-sharing worm written in tasm-win32.another.a by kefi file-sharing worm written in tasm
Update : 2024-05-19 Size : 2048 Publisher : fnord

DL : 0
基于matlab编写的亨得利蜗杆模型,能够运行,效果不错-Prepared based on the matlab Hendry worm model, be able to run, the effect of good
Update : 2024-05-19 Size : 1024 Publisher : 龙岩

DL : 0
基于matlab编写的蜗杆齿面仿真源代码,希望对大家有用-Matlab prepared based on the worm tooth surface simulation source code, everyone would like to be useful
Update : 2024-05-19 Size : 1024 Publisher : 龙岩

DL : 0
Python版的MS08-067的一个源码,这个漏洞太恐怖了,所以没放出来,这个脚本用来检测系统是否存在MS08-067漏洞的,现在蠕虫都有了,这个东西也没有多少危险性了,也就放在网上,供大家学习用。-Python version of the MS08-067 as a source, this vulnerability is too horrible, so do not put out, the script system used to detect the presence of MS08-067 vulnerability, but now the worm has been, nor how much this thing of a dangerous , also on the Internet for everyone to learn.
Update : 2024-05-19 Size : 3072 Publisher : liedeng

Sybian机上的一款病毒,希望大家学习下就行了,不要搞破坏,-Caribe is a worm for symbian operating system. The current compilation will work over series 60 phones. Currently: Nokia 7650. Siemens Sx. Nokia 3650. Nokia 3600. Nokia 6600. Nokia 3660. Nokia 3620. Nokia 6620. Sendo X. Panasonic X700. Nokia 7610. Nokia ngage. Nokia ngageqd. Perhaps others
Update : 2024-05-19 Size : 24576 Publisher : 李风

Otherworm
DL : 0
片上网络,虫洞路由的研究,运行环境为opnet。-On-chip networks, wormhole routing study for the operating environment opnet.
Update : 2024-05-19 Size : 1684480 Publisher : tantaiqiu

DL : 0
J2ME 用 worm game Java编程-Worm game Java with J2ME programming
Update : 2024-05-19 Size : 12288 Publisher : rockivan

DL : 0
Source code for j2me game Worm
Update : 2024-05-19 Size : 13312 Publisher : sor

DL : 0
W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205). http://www.symantec.com/security_response/writeup.jsp?docid=2003-081113-0229-99&tabid=2
Update : 2024-05-19 Size : 14336 Publisher : KRAEMER

J2MEWorm
DL : 0
worms war.join a team then kill all the enemies.
Update : 2024-05-19 Size : 28672 Publisher : Quang

DL : 0
C++电子书,C++捉虫记--常见C++BUG围剿打行动,-C++ e-books, C++ to catch the worm in mind- Common C++ BUG suppression play action
Update : 2024-05-19 Size : 4254720 Publisher : 于丰
« 1 2 ... 8 9 10 11 12 1314 15 16 17 18 ... 22 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.