This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus,
FileReg.icp is a plug-in for IceSword 1.20. It can access the disk partitions directly with the help of IceSword's functions. So it can manipulate the disks and registry keys directly, bypassing some Windows system components, like ntfs.sys, fastfat
What does ZEMAX do? ZEMAX is a program which can model, analyze, and assist in the design of optical systems. The interface to ZEMAX has been designed to be easy to use, and with a little practice it can allow very rapid interactive design. Most ZEM
Table of Contents Linux Power Tools Introduction Part I - Hardware Tools Chapter 1 - Optimizing System Architecture Usage Chapter 2 - Improving Disk Performance Chapter 3 - Using External Peripherals Part II - User Tools Chapter 4 - Mastering Shells
QEmu虚拟机 做嵌入式开发的朋友试试 调试内核很方便 QEMU emulator version 0.13.0, Copyright (c) 2003-2008 Fabrice Bellard usage: qemu [options] [disk_image] 'disk_image' is a raw hard disk image for IDE hard disk 0 Standard options: -h or -help display this help and exit -
WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level pack
Book Descr iption: A descr iption and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, ex
Qemu 1.0.1 Windows QEMU emulator version 1.0.1, Copyright (c) 2003-2008 Fabrice Bellard usage: qemu [options] [disk_image] 'disk_image' is a raw hard disk image for IDE hard disk 0 Standard options: -h or -help display this help and exit -version di
Filter+Solutions10.0英汉翻译及操作说明 Lowpass notch filters :低通陷波滤波器 Order: 阶 filter circuits:滤波电路 frequency response:幅频响应 Passband :通频带、传输带宽 repeatedly cycle:重复周期 maximum signal to noise ratio:最大信噪比 gain constants:增益系数,放大常数 circuit topologies:电路拓扑结构 gain s
gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on
Process Hacker is a powerful free and open source process viewer. == Getting started == Simply run ProcessHacker.exe to start Process Hacker. There are two versions, 32-bit (x86) and 64-bit (x64). If you are not sure which version to use, open Contr
Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usabili
Master wireless testing techniques to survey and attack wireless networks with Kali Linux About This Book Learn wireless penetration testing with Kali Linux; Backtrack's evolution Detect hidden wireless networks and discover their names Explore adva
Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit