- 博客(0)
- 资源 (14)
- 收藏
- 关注
IEEE_oui_Jul_2019.csv
An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization.
OUIs are purchased from the Institute of Electrical and Electronics Engineers (IEEE) Registration Authority by the assignee (IEEE term for the vendor, manufacturer, or other organization). They are used to uniquely identify a particular piece of equipment through derived identifiers such as MAC addresses,[1][2] Subnetwork Access Protocol protocol identifiers, World Wide Names for Fibre Channel devices.[3]
In MAC addresses, the OUI is combined with a 24-bit number (assigned by the assignee of the OUI) to form the address. The first three octets of the address are the OUI.
2019-07-30
IEEE_oui_Jul_2019.txt
An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization.
OUIs are purchased from the Institute of Electrical and Electronics Engineers (IEEE) Registration Authority by the assignee (IEEE term for the vendor, manufacturer, or other organization). They are used to uniquely identify a particular piece of equipment through derived identifiers such as MAC addresses,[1][2] Subnetwork Access Protocol protocol identifiers, World Wide Names for Fibre Channel devices.
In MAC addresses, the OUI is combined with a 24-bit number (assigned by the assignee of the OUI) to form the address. The first three octets of the address are the OUI.
2019-07-30
Everything curl
Everything curl is an extensive guide to everything there is to know about curl, the project,
the command-line tool, the library, how everything started and how it came to be what it is
today. How we work on developing it further, what it takes to use it, how you can contribute
with code and bug reports and why all those millions of existing users use it.
This book is meant to be interesting and useful to both casual readers and the somewhat
more experienced developers, and offers something for you all to pick and choose from.
Don't read it from front to back. Read the chapters you are curious about and go back and
forth as you see fit.
2018-07-29
An introduction to Ajax: The history of Ajax...
The history of Ajax is similar to many other apparent overnight sensations. Although Ajax seemed to come
out of nowhere, in reality it had been percolating for a while. Several years of work spread across the Web
went into creating the tools and patterns that came together under the Ajax banner. Throughout the dHTML
era of the original Internet bubble and into the dark years after the dot-com crash, developers around the
world were unlocking the unexpected power of JavaScript to bring new and exciting application patterns to
the web.
2018-07-29
AdvancED-DOM-Scripting
Too often our DOM scripting adventures are
focused on the new glittery features and stray from the basics of good, clean web application
design. As a result, I’ve emphasized best practices throughout the book and provided solutions that
focus on usability and accessibility for both the end user and you, the developer or designer.
You can keep this book next to your computer as a reference or read it cover to cover—it’s up to
you. Either way, after working through the mix of theory, code, examples, and case studies you’ll
find inside, you’ll be well on your way to understanding exactly how and why these advanced con-
cepts work—not just what they do to your document.
2018-07-29
Practical Vim: Edit Text at the Speed of Thought
Vim is a fast and efficient text editor that will make you a faster and more efficient developer. It's available on almost every OS--if you master the techniques in this book, you'll never need another text editor. Practical Vim shows you 120 vim recipes so you can quickly learn the editor's core functionality and tackle your trickiest editing and writing tasks.
Vim, like its classic ancestor vi, is a serious tool for programmers, web developers, and sysadmins. No other text editor comes close to Vim for speed and efficiency; it runs on almost every system imaginable and supports most coding and markup languages.
Learn how to edit text the "Vim way:" complete a series of repetitive changes with The Dot Formula, using one keystroke to strike the target, followed by one keystroke to execute the change. Automate complex tasks by recording your keystrokes as a macro. Run the same command on a selection of lines, or a set of files.
Discover the "very magic" switch, which makes Vim's regular expression syntax more like Perl's. Build complex patterns by iterating on your search history. Search inside multiple files, then run Vim's substitute command on the result set for a project-wide search and replace. All without installing a single plugin!
You'll learn how to navigate text documents as fast as the eye moves--with only a few keystrokes. Jump from a method call to its definition with a single command. Use Vim's jumplist, so that you can always follow the breadcrumb trail back to the file you were working on before. Discover a multilingual spell-checker that does what it's told.
Practical Vim will show you new ways to work with Vim more efficiently, whether you're a beginner or an intermediate Vim user.
All this, without having to touch the mouse.
2018-07-29
IEEE oui.txt - 2018.7.17
This product was previously referred to as an OUI (Organizationally Unique Identifier) and is still referred to as such in many standards. OUI is an IEEE Registration Authority (RA) specific term that is referred to in various standards and may be used to identify companies on the IEEE Public Listing. A MA-L assignment includes an OUI and the right to generate various extended identifiers based on that OUI. It is most often used to create IEEE 802-defined MAC addresses (EUI-48 and EUI-64).
2018-07-29
Penetration Testing with the Bash shell
This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.
The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.
2018-07-29
Hacking the Hacker Learn From the Experts Who Take Down Hackers
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.
2018-07-29
IntelD845EPI电子版手册,BIOS更新程序,
IntelD845EPI电子版手册,词汇表,BIOS更新程序.
IntelD845EPI这款老板子不支持U盘启动,通过刷新BIOS可以实现此功能.附带电子版技术手册.
2009-06-29
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人