- 博客(1)
- 资源 (10)
- 收藏
- 关注
原创 分析口令攻击技术
攻击者攻击目标时常常把破译用户的口令作为攻击的开始。只要攻击者能猜测或者确定用户的口令,他就能获得机器或者网络的访问权,并能访问到用户能访问到的任何资源。如果这个用户有域管理员或root用户权限,这是极其危险的。 分析口令攻击这种方法的前提是必须先得到该主机上的某个合法用户的帐号,然后再进行合法用户口令的破译。获得普通用户帐号的方法很多,如: 利用目标主机的Finger
2007-08-12 03:56:00 1942 1
Windows版libxml2.7.8
Windows版libxml2.7.8开发库。
--------------
This is libxml2, version 2.7.8, binary package for the native Win32/IA32
platform.
The files in this package do not require any special installation
steps. Extract the contents of the archive whereever you wish and
make sure that your tools which use libxml2 can find it.
For example, if you want to run the supplied utilities from the command
line, you can, if you wish, add the 'bin' subdirectory to the PATH
environment variable.
If you want to make programmes in C which use libxml2, you'll
likely know how to use the contents of this package. If you don't, please
refer to your compiler's documentation.
If there is something you cannot keep for yourself, such as a problem,
a cheer of joy, a comment or a suggestion, feel free to contact me using
the address below.
Igor Zlatkovic (igor@zlatkovic.com)
2018-05-25
Excel2003教案
Excel2003教案Excel2003教案Excel2003教案Excel2003教案Excel2003教案Excel2003教案Excel2003教案
2011-03-16
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人