Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
Rapid PHP 2018 15.5
IBDAC 6.4
Online Course Booking Script 1.3.3
Database Workbench Pro 5.6.4
Job Portal Script 1.3.2
The C# PDF Library 5.2
PostgreSQL Data Access Components 6.0
Virtual Data Access Components 11.0
HTMLPad 2018 15.5
WeBuilder 2018 15.5
SentiMask SDK Trial 2.0.0
Track Order For Magento 2 1.0.0
Calendar 365 For Dynamics CRM 4.0
Scimbo 1.2
Odoo Furnito Theme 1.0
Top Code
VisualNEO Web 2018.12.15
Azizi search engine script PHP 4.1.10
Paste phpSoftPro 1.4.1
Extreme Injector 3.7
Deals and Discounts Website Script 1.0.2
ADO.NET Provider for ExactTarget 1.0
Solid File System OS edition 5.1
Classified Ad Lister 1.0
Aglowsoft SQL Query Tools 8.2
Invoice Manager by PHPJabbers 3.0
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
ATN Resume Finder 2.0
ATN Site Builder 3.0
Availability Booking Calendar PHP 1.0
Top Search
Code To Add Url
Photo Add Comment Php
Dirty Word
Guestbooks Aspnetindex
Gallery Comment
German Guestbook
Php Banner Traffic Tracking
Html Guestbook Codes
Gallery Comments
Free Article Directory Script For Website
Article Directory Script For Wordpress
Jforum Source Code
Twitter Update Script Php
Time Limit Links
Tally Vouchers Customization Tdl
Related Search
Email Brute Force
Brute Force Yahoo Email
Knights Tour Brute Force
Brute Force
Brute Force Pattern Algorithm
Brute Force Php
Brute Force Implementation In C
Php Brute Force
Brute Force String Matchign
Brute Force String Matching
Brute Force Algorithm Using Java Cdes
Program Brute Force
Brute Force Attack
Brute Force String
Brute Force Html
 Email Brute Force 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  






This is a very simple, short Sudoku solver using a classic brute-force approach.

What makes it nice is the purely arithmetic one-liner computing the constraint c (the sequence of already used digits on the same row, same column, same block of a given cell).



A simple brute-force Sudoku solver written in functional-programming style. This code is not aimed for speed, the goal is to write a clear, compact and (hopefully) pedagogical functional solution.



This is just a brute force implementation of k nearest neighbor search without using any fancy data structure, such as kd-tree. However it is the fastest knn matlab implementation I can find.

A partial sort mex function is implemented...



MjA¶lnir is a a java-based brute force algorithm for obtaining keystore passwords by brute force. It is multi-threaded



This program displays the contour plot of an mxn (m ~= n) matrix, and then calculates the area for regions above a given level. This is a brute force implementation. It probably has some bugs, and there are probably more elegant ways to do this,...



Default Wordpress installation is vulnerable to brute force and dictionary attacks, because there is no limit how many times user can use invalid password before finding the correct one. This plugin closes this security hole by introducing maximum...



RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRar archives. The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is...



This script was written to help stop automated brute force attacks against your website. Are you tired of seeing www.yourdomain.com\\..\\..\\..cmd.exe in your log files? This script uses a custom 404 page that logs the IP address of the person...



Pennywize is a script which will completely protect your website from password traders and brute force attacks. Simple to install and very effective.



T4w Sentry is Unix compatible. A complete all-in-one password security solution and HTML form login script. It protects against *brute force* attacks and it neutralizes compromised passwords. Unsurpassed protection that works with, and enhances,...



Enhanced password protection with HTML form login. A complete security solution, it protects against brute force attacks and neutralizes compromised passwords.



What is that password? - you think and start falling into despair. Cheer up! Accent Password Recovery will recover the lost password and you will be able to work with your spreadsheet again. This friendly and easy-to-use software features a wide...



OC11-ACANA is the security system for websites for members to protect the contents from Brute Force Attack and Account/Password abuse.

This system cooporates with Apache of your web server and OC11-ACANA Server and protect your site...



A java application for creating, playing and solving SuDoku puzzles of various types. Features both a Swing GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute force search of...



Computes BER v EbNo curve for convolutional encoding / soft decision Viterbi decoding scheme assuming BPSK.

Brute force Monte Carlo approach is unsatisfactory (takes too long) to find the BER curve.

The computation uses a...



using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack).also keep a log in MySQL and have email reporting



It can be used by photographers and other artists to promote their works.

Here are some key features of "PageCarrier Photo Free":

dlTE Home Page
dlTE Moving Slider
dlTE Logo
dlTE Picture Viewer in...



This tool is a lightweight, fast and reliable Sendmail filter that implements a real-time Sender e-Mail Address Verification technology. This technology can stop some kinds of SPAM with a spoofed sender's e-Mail address. Also it implements a...



_____________
where to start
dldcdldcdldcdldcdldcdldcdldcdldcdldcdldcdldcdldcdldc
Look at hex_a_hop.m using MATLAB. Octave, a free imitator of MATLAB, can also "work".

Unless you are curious, there is no reason...



SUDOKU_LVL2 - A Sudoku Solver.

Usage : Sol=sudoku_lvl2(A)
Where A is a incomplete sudoku grid (9 x 9) represented as a 9 x 9 matrix of integers (0-9) with the empty cells being filled with zeros.

The algorithm presented...