There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Creating-a-phishing-page---simple-steps-for-dummies-PhP-
Tor---Onion-Proxy---Example
Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router".[8][9] Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays[10] to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms".[11] Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.TCP-IP-Client-and-Server-EXAMPLE-
TCP-IP-Client-and-Server (EXAMPLE) Example Client/Server program that uses TCP TCP/IP provides end-to-end connectivity specifying how data should be : formatted, addressed, transmitted routed, and received at the destination can be used in the internet and in stand-alone private networks it is organized into layersSave-your-webpage-as-PDF-JAVASCRIPT
Save your webpage as PDF / Print your webpage - Easy WayTest-Automation-Generate-ReportNG-reports-in-Selenium-WebDriver-Maven-Project
Verify Linkedin webPage with Assert methodsJUnit-Validating-a-domain-Maven-Installation-
Validating three domain names according to specific pattern (DOMAIN_NAME_PATTERN)Botnet---SynFlood-Attack
Example of Botnet FunctionJava--Reverse-words-in-a-String
This program reverses every word of a string and display the reversed string as an outputYao-Garbled-Circuits
Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. Andrew Yao of Stanford University first proposed the protocol in 1986 to solve his famous Millionaires' Problem.[1] The protocol is also known as Yao's protocol, Yao's garbled circuit protocol or simply the GC protocol in the cryptography literature. In the garbled circuit protocol, the function has to be described as a Boolean circuit.Love Open Source and this site? Check out how you can help us