Before we begin, we have to know about the principle of traceroute in order to hiding from it. Principle of traceroute According to wikipedia, traceroute sends a sequence of UDP…
Read More
Before we begin, we have to know about the principle of traceroute in order to hiding from it. Principle of traceroute According to wikipedia, traceroute sends a sequence of UDP…
There’re a lot of funny and clumsy answer about this question, some of them even convert string to char* and then using strtok to accomplish it. But here, I figure…
Lot’s of people uses pyrit to crack wireless passworkds and don’t have a decent display card in home(GPU), but some of them might want to crack WPA2 encryption with a nice…
It is never a easy problem to compile curl library under windows, especially a static library.