본문 바로가기

분류 전체보기2851

SAMInside - password recovery program for cracking SAMInside 2.6.5.0 SAMInside is designated for the recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords. Some of its outstanding features include: • The program has small footprint, it doesn't require the installation and can be run from a diskette, CD/DVD-disk or USB-drive. • Includes over 10 types of data import and 6 types of password attack: .. 2011. 4. 8.
Snort 2.9.0.5 is available for download! This is the changelog for Snort 2.9.0.5: * src/build.h: Increment Snort build number to 134 * src/: decode.h, encode.c: * src/dynamic-plugins/sf_engine/: sf_snort_packet.h: * src/preprocessors/: spp_sfportscan.c, spp_frag3.c: * src/output-plugins/: spo_alert_fast.c: * src/preprocessors/Stream5/: stream5_common.c: Updated portscan to set protocol correctly in raw packet for IPv6 and changed the e.. 2011. 4. 8.
방사능 노출 지역 예방 대처법 1. 방사능이 노출된 지역에서는 되도록 외출을 삼가합니다. 2. 비를 맞지 않도록 합니다. 빗물에는 평소보다 높은 방사능 물질이 포함되어 있습니다. 3. 옷은 가능한 방수처리가 된 코팅된 옷을 입습니다. 4. 신발은 빗물이 안들어가는 등산화나 장화 등을 신습니다. 5. 모자는 꼭 써주세요. 6. 비닐장갑이나 고무장갑 가죽장갑 등을 껴줍니다. 7. 우비를 항상 준비해 다니다가 비가 오면 입어줍니다. 8. 집안의 환기구나 창문 등 공기가 들어오는 틈새를 잘 막아줍니다. 9. 외출 후에는 반드시 샤워를 해주시고 노출된 옷을 세탁해주세요. 10. 비상용 요오드를 준비할 수 없다면 김, 미역, 다시마, 계란노른자 등 요오드가 많이 첨가된 음식을 먹어주세요. 11. 외출시 방진용 마스크나 안경 선글라스 등을 착용해.. 2011. 4. 7.
Android Reverse Engineering - A Kick Start Contents Setting up the Ground Getting Started with the Game Real Android Reversing Decoding the Algorithm Final Verification of Reversing Conclusion Setting up the Ground Well, it seems people are getting crazy about Android platform(everyone is trying to buy an Android phone!). I don�t have an Android cell phone but, lets see if I can get my hands dirty with this Linux+java clean room engineer.. 2011. 4. 6.
FOR /F tokens and delims Step by step The general syntax of FOR /F commands, at least the part we are going to analyze, is: FOR /F "tokens=n,m* delims=ccc" %%A IN ('some_command') DO other_command %%A %%B %%CUsing an example, we are going to try and find a way to define values for tokens and delims. For our example, we are going to find out who is logged on to a computer with a specified IP address (like, say, one found in our firew.. 2011. 4. 5.