Welcome![Sign In][Sign Up]
Location:
Search - hash.d

Search list

[Other resourceANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) -
Platform: | Size: 7742358 | Author: 谭朋柳 | Hits:

[Other resourcejeromel

Description: 利用Hash技术统计单词的频度。扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现的频度。用线性探测法解决Hash冲突。设Hash函数为:Hash(Key)=[(Key的首字母序号)*100+(Key的尾字母序号)] Mod 41 -use statistical word frequency. Scanning a C source files, using the hash table storage procedures of the keyword statistics and the proceedings of the keyword frequency. Linear Hash detection solution for the conflict. Hash functions located : Hash (Key) = [(the first letters Key serial number) * 100 (Key tail alphabetical serial number)] Mo d 41
Platform: | Size: 21297 | Author: 芦林飞 | Hits:

[Windows Developcpp_mru_cache

Description: I suppose you know what a MRU cache is, otherwise you wouldn t been reading this. This is an implementation of a very simple one using only STL. To implement a cache, derive a subclass from this template class. As an implementor, you d have to implement two methods: HandleNonExistingKeyFetch - to handle cache misses. In this method you access the real source of data behind the cache and return the value. HandleItemRelease - (optional) called when an item is removed from the cache. The cache class is a template of two types, a key and value (like hash map). The value type is the type of the resource and the key type is the type of the resource address. (this is how you fetch a resource)
Platform: | Size: 1828 | Author: haha | Hits:

[Disassembly梅花三弄版dezend V1.0

Description:

php开源屠龙刀
梅花三弄dezend v1.1
[color=#FF0000]主要增加对用zendguard 4.01进行加密的dezend支持[/color]该类文件开头格式:
<?php @Zend;
4147;
现改为:首行包含Zend的文件为需dezend文件

*****************************************
梅花三弄dezend v1.0
一、特点:
1.基于"黑刀4.3"作为内核,[color=#FF0000]支持单文件、多文件、整站或多站.样子如大家非常熟悉的flashfxp,[/color]你可拖动鼠标快速选择多个文件或文件夹.
2.[color=#0000FF]重建原目录结构,目录层数不限,判断是否是zend文件,避免重复dezend,非zend文件也copy至相应目录,保持与原站点整体目录结构和文件数量一致[/color],如所有文件dezend成功可直接整站测试.
    针对目录数量多,文件数量多的大站型需dezend来说,本工具是最佳选择.
3.方便快捷,拖动鼠标选定一批目录或文件后从左边拖到右边或从右边拖到左边即可,可视化人性化操作方式(与flashfxp使用方法基本相同);
4.支持带空格目录路径或文件名和长文件名
5.支持定制dos执行参数,并可显示dos执行后的返回信息
6.支持dezend后自动执行一批替换,实现扩展式二次dezend,不用于dezend也是一个强大的批量替换工 具,历遍文件夹把选定的后缀文件进行替换
7.使用内存少,单进程目录历遍,不过速度远比平时上传文件快一些
8.支持中途暂停和继续执行
9.支持任务列表保存和恢复
10.智能记录当前操作目录
11.本软件绿色,下载后可直接使用,运行后仅在桌面生成一个快捷方式,不对其它有操作
12.增加黑刀版的config.ini缺了一批关于mysql的函数名,当然也缺了日期时间方面的,暂没有补上
13.支持鼠标右键菜单的全选、取销全选,建立目录、删除文件或目录(与flashfxp使用方法基本相同)
14. 支持双击打开上级目录、双击本窗口打开目录、支持双击调用相应程序打开文件进行编辑(与flashfxp使用方法基本相同)
二、备注:
1、主要用了"黑刀4.3"作为内核,大家可下载其最新版,并把本压缩包mh_dezend.exe和Change.ini及两个图标放到根目录即可.
2、基于核心程序的原因,整站dezend后不一定能使用,需要一定的修改技术,尤其是对高版本的php的function未能很好的dezend,当然不影响

运行,但可读性差。
3、本版免费使用,无功能限制,一切后果自负
4、本想上传一图片和使用教程和实例的,....感觉上一看即会的,觉得不是很必要,请使用之后帮忙上传
5.这是第一个测试版,可能会有一些错误的,望各位用后提出建议,以进一步改进。

三、自我评价:是dezend的一把最新屠龙刀,当然如黑刀兄弟所说:[color=#FF0000]刀可用来切菜,也可用来杀人,请各自注意合理使用[/color]
四、使用注意事项:
1.可把需dezend的文件复制到程序目录下的"zend文件夹,打开主程序拖到另一目录即可,也可点击A、B目录按钮选取源目录和目标目录,选取目

录后,下次打开将自动定位到这两个目录
2.点击“上级目录”虽然可以改变目标目录或源目录,但不会记下这方法打开的当前目录,下次打开仍以最近一次用点击A、B目录按钮选取源目录和目标目录进行定位.
3.要是你对dos命令执行参数不是很熟悉,用默认设置即可,也可参照一下压缩包内附的使用说明里《执行dos命令解密参数详解》(摘自黑刀4.3版使用说明)

梅花三弄QQ:279491263
************************************************************

====执行dos命令解密参数详解(摘自黑刀4.3版使用说明)====

[{/}|{-}command[:attributes]]

/h or /? help (帮助信息)
/detail{/d} show detail(显示详细源代码和opcode信息,非常有用)
/opcode show opcode(opcode数值)
/oparray show oparray(oparray信息)
/function show all the function(所有内部函数名)
/class show all the class(所有内部类名)
/hash show all known hash table(所有认识的哈希表)
/info log general infomation(default phpinfo.log)(其他一些信息)
/raw{/r} dump raw op code(显示详细原始opcode信息,遇到exception的时候非常有用)
/execute execute the file(default NOT)(运行源文件)
/backup{/b} backup the file with extension .bak if out file exist(替换前备份)
/append{/a} appaned to previous log file(追加日志,默认是替换)
/tick{/t} show tick span(显示时间消耗)
/noexpire ignore file expire(忽略文件是否过期)
/noindent ignore indent(去掉缩进)
/compact dump with compact style[not support yet](暂未使用)
/classic dump with classic style[not support yet](暂未使用)
/bug dump bug statement(显示BUG)
/full set to full mode(暂未使用)
/force{/f} set to force mode(和/i使用时强制导入config文件)
/import{/i} import class and function name[obfuscate name] from config file(程序根据源文件混淆与否决定导入config文件)
/export{/e} export class and function name[obfuscate name] to config file(导出函数名和类名到config文件)
/obfuscate dump obfuscate name and its url encoded name(显示被混淆的名字)
/dic dump obfuscate name dictionary depend on $level(生成混淆名字典,根据level设置字符数范围)
/tab dump with tab prefix(default space)(使用tab缩进,默认使用空格缩进)
/indent:$i dump with indent $i(default 4)(缩进字符数,默认是4)
/stack:$i dump with stack size $i(default 16)(内部堆栈起始字节数,默认16)
/string:$i dump with stack string length $i(default 4096)(内部字符串堆栈字节数,默认4096,如果内存充裕,可以设大)
/level:$i,$j dump with decode level range $i-$j(default 4-1)(混淆相关的字符数范围,用来猜测名字的字符数范围)
/ext:$ext dump to file with file extension $ext(default .de.php)(输出文件扩展名,*表示使用源文件扩展名)
/root:$root dump to $path + ( $source - $root ) if specified /path:$path(截取路径根路径)
/path:$path dump to $path(输出路径)
/file:$file dump to $file(输出文件名)
/config[:$c] override config file by ?[:phpinfo.log])(config文件名,默认是config.ini)
/log[:$name] override log name by $name([: ?])(日志名)
/logtype:$t override log type by $t<file|registry|debug|messagebox>(输出日志方式,文件、注册表、debug字符串、对话框)
/ini[:$ini] override php.ini search path by $ini([:.], if not specified)(php.ini的优先搜索路径,默认是.,即当前目录)

Enviroment string PHP_DECODE_XXX override default setting, see help(命令行参数都有对应的环境变量)
Priority(high->low):
Command line->Enviroment string->default setting(优先权:命令行 高于 环境变量 高于 默认设置)

if $ext set to *, then keep origin file extension
if $path = 'd:\', $root = 'e:\', then 'e:\php\xxx'=>'d:\php\xxx'


 


Platform: | Size: 1062308 | Author: liu3zy | Hits:

[File OperateAXPUnpack

Description: 最近研究了一下*狐的天龙**的打包文件axp格式,其实网上也有一些同学的分析,不过不是很完整。 过程: 1、OD加载游戏,通过对文件I/O的API下断点,定位游戏加载的打包文件 2、对程序读入的文件数据缓冲区下内存断点,定位索引和偏移的计算算法 3、通过IDA提取文件偏移和hash计算的代码,通过内嵌汇编测试程序 4、将代码还原成c代码 整个过程没有太大的技巧,关键是耐心和细心的考验,文件头和索引头还有一些字段无法确定其作用,许多地方是都是猜测,无法保证正确性。后还原时代码果如暴雪的mpq文件的hash算法几乎一样。具体文件格式和hash算法代码可以参考程序中的结构体的定义和代码。 收获:对汇编语言的符号扩展和c中有符号、无符号的处理和理解,这里调bug耽误很多时间:D:
Platform: | Size: 69897 | Author: jamesma | Hits:

[P2PANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Platform: | Size: 7742464 | Author: 谭朋柳 | Hits:

[Data structsjeromel

Description: 利用Hash技术统计单词的频度。扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现的频度。用线性探测法解决Hash冲突。设Hash函数为:Hash(Key)=[(Key的首字母序号)*100+(Key的尾字母序号)] Mod 41 -use statistical word frequency. Scanning a C source files, using the hash table storage procedures of the keyword statistics and the proceedings of the keyword frequency. Linear Hash detection solution for the conflict. Hash functions located : Hash (Key) = [(the first letters Key serial number)* 100 (Key tail alphabetical serial number)] Mo d 41
Platform: | Size: 21504 | Author: 芦林飞 | Hits:

[Windows Developcpp_mru_cache

Description: I suppose you know what a MRU cache is, otherwise you wouldn t been reading this. This is an implementation of a very simple one using only STL. To implement a cache, derive a subclass from this template class. As an implementor, you d have to implement two methods: HandleNonExistingKeyFetch - to handle cache misses. In this method you access the real source of data behind the cache and return the value. HandleItemRelease - (optional) called when an item is removed from the cache. The cache class is a template of two types, a key and value (like hash map). The value type is the type of the resource and the key type is the type of the resource address. (this is how you fetch a resource) -I suppose you know what a MRU cache is, otherwise you wouldn t been reading this.This is an implementation of a very simple one using only STL.To implement a cache, derive a subclass from this template class.As an implementor, you d have to implement two methods: HandleNonExistingKeyFetch- to handle cache misses. In this method you access the real source of data behind the cache and return the value. HandleItemRelease- (optional) called when an item is removed from the cache.The cache class is a template of two types, a key and value (like hash map). The value type is the type of the resource and the key type is the type of the resource address. (this is how you fetch a resource)
Platform: | Size: 1024 | Author: | Hits:

[Streaming Mpeg4jzyDVR1.1

Description: 海康威视ds-400X系列采集卡视频监控软件,采用delphi7开发。含全部源码。-Hikvision ds-400X series of video surveillance capture card software, developed using delphi7. Containing all the source code.
Platform: | Size: 3696640 | Author: baiwei507 | Hits:

[Compress-Decompress algrithms+Compress

Description: Per gli interessati ai metodi della compressione una vera miniera d oro, oltre 70 algoritmi all interno di moduli base indipendenti consentono a questo programma di mostrare il loro utilizzo e le loro performances, ecco elencati alcuni di essi : base64/crc32/fibonacci/mtf/freq/adddif/bwt/fix12/fix128/flatter/ huffman/lzw/lzs/rle/lbe/hash/vbc/scrambler, e tanti tanti altri.-Per gli interessati ai metodi della compressione una vera miniera d oro, oltre 70 algoritmi all interno di moduli base indipendenti consentono a questo programma di mostrare il loro utilizzo e le loro performances, ecco elencati alcuni di essi : base64/crc32/fibonacci/mtf/freq/adddif/bwt/fix12/fix128/flatter/ huffman/lzw/lzs/rle/lbe/hash/vbc/scrambler, e tanti tanti altri.
Platform: | Size: 171008 | Author: vittorio | Hits:

[Delphi VCLDelphi_Md5

Description: Delphi源码之:Md5算法+判断网页是否更新过 通过hash验证Md5算法 判断指定网页是否更新过,比如你要下载网页,昨天已经下载过的,今天不想再次下载,可以参考本程序的判断方法-Delphi source code is: Md5 algorithm+ to determine whether the updated web page through the Md5 authentication hash algorithm to determine whether the updated designated page, for example, you want to download page, downloaded yesterday, and today do not want to download, you can reference to determine the method of this procedure
Platform: | Size: 272384 | Author: mayongtao520 | Hits:

[Data structsd

Description: 设定哈希函数 H(key) = key MOD 11 ( 表长=11 ),输入一组关键字序列,根据线性探测再散列解决冲突的方法建立哈希表的存储结构,显示哈希表,任意输入关键字,判断是否在哈希表中。-Set the hash function H (key) = key MOD 11 (table length = 11), enter a keyword sequence, then hash based on the linear probing method of conflict resolution to establish the storage structure of the hash table, hash table display , any keywords, to determine whether the hash table.
Platform: | Size: 1024 | Author: 申超波 | Hits:

[Data structsshuju

Description: 书中使用主流的程序设计语言C++作为具体的实现语言。 书的内容包括表、栈、队列、树、散列表、优先队列、排序、不相交集算法、图论算法、算法分析 、算法设计、摊还分析、查找树算法、k-d树和配对堆等。 -Book using mainstream programming language C++ as a specific implementation language. The book includes tables, stacks, queues, trees, hash tables, priority queues, sorting, disjoint set algorithm, graph theory, algorithms, algorithm analysis, algorithm design, amortized analysis, search tree algorithms, kd trees and pairing heaps and so on.
Platform: | Size: 113664 | Author: 任鹏富 | Hits:

[Data structssuanfa

Description: 数据结构基本算法演示程序实现: 1、实现KMP模式匹配算法、哈夫曼编码算法、由遍历序列恢复二叉树、Prim算法、Kruskal算法、Floyd算法、Dijkstra算法、拓扑排序、关键路径算法、二叉排序树生成算法(含平衡化)、哈希表生成及哈希查找算法、希尔排序、快速排序、堆排序、归并排序、基数排序。(四则表达式计算、矩阵运算、有向图的强连通分量求解) 2、算法中的链表结构和数组结构的基本操作要求单独函数实现(同组内算法要求共享使用)。 要求数据结构基本算法演示程序具有菜单选择,算法要有结果的显示形式,显示程序框架 -Basic algorithm demo program data structures to achieve: 1, and KMP pattern matching algorithm, Huffman coding algorithm, the binary tree traversal sequence recovery, Prim algorithm, Kruskal algorithm, Floyd algorithm, Dijkstra algorithm, topological sorting, critical path algorithm, binary sort tree generation algorithm (including the balance of), hash table hash search algorithm generates and Hill sort, quick sort, heap sort, merge sort, radix sort. (D expression computing, matrix operations, have to solve the graph strongly connected components) 2, the algorithm in the list structure and basic operation of the array structure requires a separate function to achieve (within the algorithm requires the same set of shared use.) Basic algorithm required data structure has the menu to select the demonstration program, the algorithm should have the results display format, display program framework
Platform: | Size: 20480 | Author: dark | Hits:

[JSPsrc

Description: utilisation d un hash set et le tree set exemple
Platform: | Size: 1024 | Author: dali | Hits:

[VC/MFCdata-structure-1800-included-answer

Description: 数据结构 1800道 。word 完整版 包含答案。 1. 散列文件使用散列函数将记录的关键字值计算转化为记录的存放地址,因为散列函数是一对一的关系,则选择好的( )方法是散列文件的关键。【哈尔滨工业大学 2001二、5 (2分)】 A. 散列函数 B. 除余法中的质数 C. 冲突处理 D. 散列函数和冲突处理 -Data structure 1800. The word full version contains the answer. A hash file using the hash function will be the key value of record translate into record store address, because the hash function is one-to-one relationship, choose a good () method is the key to the hash file. [Harbin Institute of Technology in 2001 two (2 points)] A. The hash function B. In addition to the primes C. I France conflict handling D. hash function and conflict management
Platform: | Size: 1073152 | Author: lvhao | Hits:

[Linux-Unixdbus-hash

Description: Generic hash table utility internal to D-Bus implementation.
Platform: | Size: 12288 | Author: guekongseng | Hits:

[OS programProcdump

Description: dump 系统进程信息,结合mimikatz 使用,可以获取系统hash-Using ProcDump usage: procdump [-a] [[-c|-cl CPU usage] [-u] [-s seconds]] [-n exceeds] [-e [1 [-b]] [-f <filter,...>] [-g] [-h] [-l] [-m|-ml commit usage] [-ma |-mp] [-o] [-p|-pl counter threshold] [-r] [-t] [-d <callback DLL>] [-64] <[-w] <process name or service name or PID> [dump file] |-i <dump file> |-u |-x <dump file> <image file> [arguments] >] [-? [-e]
Platform: | Size: 262144 | Author: shuai | Hits:

[Data structsProject6

Description: 使用散列表设计实现一个字典,假设关键字为整数且 D 为 961,在字典 中插入随机产生的 500 个不同的整数, 实现字典的建立和搜索操作。分别使 用线性开型寻址和链表散列解决溢出。-Designed and implemented using a hash table dictionary, if your keywords is an integer and D 961, in the dictionary 500 different integers inserted randomly generated, to achieve the establishment of the dictionary and search operations. Respectively Open type linear chain hash addressing and solving overflow.
Platform: | Size: 1736704 | Author: stephen | Hits:

[Special Effectsslwadlo97

Description: hash algorithm ,with auto expand features div hr div B 文件列表 B : div d()
Platform: | Size: 5120 | Author: Cgthhnine | Hits:
« 12 »

CodeBus www.codebus.net