Pre-Exploit Password Attacks Tools: 1. ncrack Ncrack 0.6 ( http://ncrack.org )Usage: ncrack [Options] {target and service specification}TARGET SPECIFI ...
分类:
其他好文 时间:
2019-07-17 00:26:36
阅读次数:
97
paper notes learning to See in the Dark: ·直接从bayer raw做起,避免复杂的sRGB转换过程使信息丢失 ·将分阶段的pipeline合在一起训练,避免噪声在后处理中的放大 ·使用多个通道的输出拼接来代替翻卷积或差值,避免棋盘格?推广到非整数倍上采样? ...
分类:
其他好文 时间:
2019-07-15 18:44:01
阅读次数:
121
Sprint @Transnational is being ignored in the following cases:1. when the caller method is calling the @Transaction annotated method from the same cla ...
分类:
编程语言 时间:
2019-07-14 18:09:46
阅读次数:
208
1. 概述条件随机场(Conditional Random Field, CRF)是概率图模型(Probabilistic Graphical Model)与区分性分类( Discriminative Classification)的一种接合,能够用来对“结构预测”(structured predi ...
分类:
其他好文 时间:
2019-07-12 09:22:12
阅读次数:
126
Java Applet Attacks Download virtual machines from the following website: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ ...
分类:
其他好文 时间:
2019-07-08 00:09:17
阅读次数:
110
Gaining Root with Metasploit Platform: Kali Linux, Kioptrix Level 1 1. Find the IP of Kioptirx 2. Scan the Kioptrix server and analyst the result. 3. ...
分类:
其他好文 时间:
2019-07-06 19:29:47
阅读次数:
106
Compiling an Exploit Exercise: samba exploit 1. Search and download the samba exploit source code from Exploit Database. https://www.exploit-db.com/ex ...
分类:
其他好文 时间:
2019-07-06 19:23:13
阅读次数:
102
Book: A. Figalli 《The Monge Ampere Equation and Its Application》 1.Let $A,B\in R^{n\times n}$, and assume that $A$ is invertible. Then, $$\frac{d}{dt} ...
分类:
其他好文 时间:
2019-07-03 20:02:53
阅读次数:
105
课上内容(Lesson) sticky notes 便利贴;即时贴 # write down 3 favorite foods or drinks pork ribs 排骨;肋骨;猪肋排;叉烧排骨 cola hotpot fruit soda Mapo Tofu strawberries # Whi ...
分类:
其他好文 时间:
2019-07-02 22:50:02
阅读次数:
142
Finding the Offset 1. Use the Metasploite pattern_create.rb tool to create 5900 characters. 2.Write the python test script. The shellcode is copied fr ...
分类:
其他好文 时间:
2019-06-27 01:09:07
阅读次数:
143