摘要: 最近研究了一些网络方面的东西,特此实践一把。背景描述:1、处于学校内网,用Wireshark能抓包,希望通过抓取别人的账号和密码来进行登录。2、CC98为校内论坛,登录系统使用了AJAX提交和普通表单提交两种方式。3、AJAX提交使用了MD5加密,普通提交为明文。4、普通表单提交只有在浏览器关闭Javascript时才启用,因此很难抓到这种包,本文主要针对AJAX的情况。问题描述:1、如果能抓到明文包,那么就没有任何难度。2、由于AJAX提交前使用了MD5加密,所以即使抓得,也无法使用。破解思路:1、AJAX的加密部分通过Javascript脚本完成,因此通过修改脚本能绕过加密这一步。2、绕过 阅读全文
posted @ 2012-05-10 23:08 长江西岸 阅读(1793) 评论(0) 推荐(1) 编辑
摘要: Wooden SticksTime Limit:1 Second Memory Limit:32768 KBThere is a pile of n wooden sticks. The length and weight of each stick are known in advance. The sticks are to be processed by a woodworking machine in one by one fashion. It needs some time, called setup time, for the machine to prepare process 阅读全文
posted @ 2011-01-18 23:51 长江西岸 阅读(435) 评论(0) 推荐(0) 编辑
摘要: GridlandTime Limit: 1 Second Memory Limit: 32768 KB BackgroundFor years, computer scientists have been trying to find efficient solutions to different computing problems. For some of them efficient algorithms are already available, these are the "easy" problems like sorting, evaluating a polynomial 阅读全文
posted @ 2010-12-13 12:57 长江西岸 阅读(835) 评论(0) 推荐(0) 编辑
摘要: 一道作业题,网上没找到相关代码,就自己写了一个,比较有意思,经随机数10000规模测试通过。关键在于合的时候找准“分点” 阅读全文
posted @ 2010-10-07 15:08 长江西岸 阅读(639) 评论(0) 推荐(0) 编辑
摘要: Human Gene FunctionsTime Limit: 1 Second Memory Limit: 32768 KB It is well known that a human gene can be considered as a sequence, consisting of four nucleotides, which are simply denoted by four le... 阅读全文
posted @ 2010-09-02 00:29 长江西岸 阅读(311) 评论(0) 推荐(0) 编辑
摘要: 问题描述:给定n种物品和一背包。物品i的重量是wi,其价值为vi,背包容量为c。问应如何选择装入背包中的物品,使得装入背包中物品的总价值最大。在选择装入背包的物品时,对每种物品i只有两种选择,即装入背包或不装入背包。不能将物品i装入背包多次,也不能只装入部分的物品i。因此,该问题称为0-1背包问题。算法分析:DP的问题可以转化为一种维护备忘录(表)的思想,0-1背包问题是DP的基本问题,其本质在于... 阅读全文
posted @ 2010-08-26 21:06 长江西岸 阅读(1750) 评论(0) 推荐(2) 编辑
摘要: Illusive ChaseTime Limit: 1 Second Memory Limit: 32768 KB Tom the robocat is presented in a Robotics Exhibition for an enthusiastic audience of youngsters, placed around an m * n field. Tom which is ... 阅读全文
posted @ 2010-05-19 12:46 长江西岸 阅读(457) 评论(0) 推荐(0) 编辑
摘要: Dancing LinksFrom Wikipedia, the free encyclopediaJump to: navigation, searchIn computer science, Dancing Links, also known as DLX, is the technique suggested by Donald Knuth to efficiently implement ... 阅读全文
posted @ 2010-05-03 16:10 长江西岸 阅读(521) 评论(0) 推荐(1) 编辑
摘要: OperandTime Limit: 1 Second Memory Limit: 32768 KB Professor Maple teaches mathematics in a university. He have invented a function for the purpose of obtaining the operands from an expression. The f... 阅读全文
posted @ 2010-05-01 11:28 长江西岸 阅读(601) 评论(0) 推荐(0) 编辑
摘要: Great EquipmentTime Limit: 10 Seconds Memory Limit: 32768 KB Once upon a time, there lived Catherine Ironfist, the Queen of Enroth. One day, she received the news of her father's death. So she sailed... 阅读全文
posted @ 2010-04-30 08:04 长江西岸 阅读(719) 评论(0) 推荐(0) 编辑