原创 LESSON 8 DIGITAL FORENSICS part VI

8.2.4 Making use of other sourcesThere are many other interesting ways of examining how a computer has been used. Nearl

原创 LESSON 7 ATTACK ANALYSIS part I

Table of Contents7.0 Introduction7.1 Netstat and Host Application Firewalls7.1.1 Netstat7.1.2 Firewalls7.1.3 Exercises7

原创 LESSON 7 ATTACK ANALYSIS part II

You, however, won't need to work out all the rules on your own. You can take advantage ofthe firewalls ability to set t

原创 LESSON 8 DIGITAL FORENSICS part II

8.1 Forensic Principles8.1.0 IntroductionThere are a number of basic principles that are necessary regardless of whethe

原创 LESSON 9 E-MAIL SECURITY part II

9.1.2 POP and SMTPAfter your e-mail client knows your e-mail address, it's going to need to know where to look forincom

原创 C++基礎語法知識點歸納

  在看《c++ Primer Plus 》的學習筆記,和大家分享,都是些很簡單的東西,但是很少能看得那麼仔細,大家一起進步~~~ Code: #include<iostream>   #include<climits> //該頭文

原创 分治法---歸併排序,改進的歸併排序,自然合併排序

要做算法題作業,關於自然合併排序的,不太清楚自然合併排序和歸併排序有什麼區別,在網上查找到下面的資料,很詳細,趕緊貼在下面和大家分享~~~ 思想:將待排序元素分成大小大致相同的兩個子集,分別對兩個子集合進行排序,最終將排好序的子集合併成所

原创 LESSON 6 MALWARE part V

6.6 Countermeasures 6.6.1 IntroductionThere are a number of ways that you can detect, remove and prevent malware. Some

原创 LESSON 7 ATTACK ANALYSIS part V

7.3 Honeypots and HoneynetsPeople who like to watch monkeys go to the zoo, because there might be monkeys there.People

原创 LESSON 8 DIGITAL FORENSICS part V

8.2.3.2 grepgrep is an immensely powerful tool. It is used to find certain lines within a file. This allows you toquick

原创 已知二叉樹的中序和前序序列(或後序)求解樹

在學算法結構時,發現了這個問題,雖然在上數據結構時老師講過,但是隻講過具體例子,沒有讓我們訓練代碼,借這次機會,上網查找了相關資料,而且這學期又剛好在學C++,感覺真的可以好好學一下。。。在網上找的資料,貼在這裏和大家共享   這種題一般

原创 LESSON 9 E-MAIL SECURITY part V

9.2.4 Forged headersOccasionally you may receive an e-mail that looks like it is from someone you know, or fromthe “Adm

原创 LESSON 9 E-MAIL SECURITY part III

9.1.3 Web MailA second option for e-mail is to use a web based e-mail account. This will allow you to use aweb browser

原创 LESSON 8 DIGITAL FORENSICS part IV

接上一篇的圖講解 From this you can start to make some attempts to read a certain type of file. There are anumber of file conver

原创 LESSON 9 E-MAIL SECURITY part IV

9.2.2 HTML E-MailOne of the security concerns with HTML based e-mail is the use of web bugs. Web bugs arehidden images