码迷,mamicode.com
首页 >  
搜索关键字:attack    ( 512个结果
跨平台抓包软件,可以替代Fiddler
Zed Attack Proxy (ZAP)?是个强大的跨平台的抓包工具,可以用来替代windows下的Fiddler https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project https://github.com/zaproxy/zaproxy/wiki/Downloads?...
分类:其他好文   时间:2015-09-04 11:12:35    阅读次数:157
zoj 2587 Unique Attack 【判断最小割是否唯一】
Unique Attack Time Limit: 5 Seconds      Memory Limit: 32768 KB N supercomputers in the United States of Antarctica are connected into a network. A network has a simple topology: M different pai...
分类:其他好文   时间:2015-08-28 13:29:06    阅读次数:140
Known plaintext attack
When you find a ZIP/RAR file with password protected in the evidence, you may try dictionary attack or bruteforce attack or Rainbow talbes... Usually ...
分类:其他好文   时间:2015-08-15 17:49:54    阅读次数:253
[LeetCode] N-Queens
The n-queens puzzle is the problem of placing n queens on an n×n chessboard such that no two queens attack each other.Given an integer n, return all d...
分类:其他好文   时间:2015-08-09 00:17:58    阅读次数:154
Tomcat6+JDK6如何加固,解决Logjam attack,
最近更新了最新版浏览器的同学是不是偶尔会遇到SSL加密协议不灵,访问不了的情况?最典型的例子是使用FF39或38.0.2访问某些网站时报错:Errorcode:ssl_error_weak_server_ephemeral_dh_key这是由于你的客户端(FF39)废弃了DHE、RC4密码,而服务器端默认使用DHE、RC4加密的密钥..
分类:其他好文   时间:2015-08-07 07:11:46    阅读次数:168
浅谈CSRF攻击方式
一.CSRF是什么? CSRF(Cross-site request forgery),中文名称:跨站请求伪造,也被称为:one click attack/session riding,缩写为:CSRF/XSRF。二.CSRF可以做什么? 你这可以这么理解CSRF攻击:攻击者盗用了你的身份,以你.....
分类:其他好文   时间:2015-08-05 12:47:15    阅读次数:110
zoj2587 Unique Attack 判断最小割是否唯一
题目链接: zoj2587 题意: 给出一张无向网络图,并给出起点和终点,破坏图的每一条边需要一定的费用,问破坏起点和终点的连通性的费用是否唯一. 解题思路: 破坏两点的连通性的最小费用,很容易联想到 网络流中的最小割, 建立源点 汇点 同时 因为图是无向图,我们需要将每条边建两次(正反向). 然后就是判断这个最小割是否唯一了:...
分类:其他好文   时间:2015-08-03 22:49:20    阅读次数:178
ZOJ 3575 Under Attack III
Under Attack III Time Limit: 7 Seconds      Memory Limit: 65536 KB Due to the successful resist in Under Attack II, the enemy lost most of their bombers and our ground forces are advancing ...
分类:其他好文   时间:2015-08-03 14:32:14    阅读次数:95
ZOJ 3574 Under Attack II 归并排序求逆序对
Under Attack II Time Limit: 5 Seconds      Memory Limit: 65536 KB Because of the sucessfully calculation in Under Attack I, Doctor is awarded with Courage Cross and promoted to lieutenant. ...
分类:编程语言   时间:2015-07-31 13:12:09    阅读次数:118
You should rebuild using libgmp >= 5 to avoid timing attack vulnerability.", PowmInsecureWarning
su -s /bin/sh -c "glance-manage db_sync" glance/usr/lib64/python2.6/site-packages/Crypto/Util/number.py:57: PowmInsecureWarning : Not using mpz_powm_s...
分类:其他好文   时间:2015-07-31 12:22:45    阅读次数:254
512条   上一页 1 ... 33 34 35 36 37 ... 52 下一页
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!