CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Sub Category
Linux-Unix
Exploit
Scanner
Crack Hack
CA auth
Linux driver
Search in result
Search
OS program list
Sort by :
«
1
2
...
.67
.68
.69
.70
.71
15072
.73
.74
.75
.76
.77
...
16274
»
jmjm.ZIP
Downloaded:0
A sample algorithm for encryption and decryption of a Vc++ Achieve. Network can use string encryption.
Date
: 2008-10-13
Size
: 22.83kb
User
:
chenchen
sniffer
Downloaded:0
sniffer is the well-known network protocol packets to monitor the theft of the procedure, this is a vc code examples.
Date
: 2008-10-13
Size
: 5.19kb
User
:
chenchen
copySimgleFile
Downloaded:0
delphi write the copy designated the beginning of the start sector number of a certain sector of the code, there is reference value
Date
: 2008-10-13
Size
: 175.85kb
User
:
王三
BackupPC-3.1.0.tar
Downloaded:0
Written by a foreigner under linux file backup software, there is reference value
Date
: 2008-10-13
Size
: 463.85kb
User
:
王三
centerserver
Downloaded:0
linux write epoll-based technology, communications servers, database using mysql
Date
: 2008-10-13
Size
: 72.78kb
User
:
王三
netfilter
Downloaded:0
linux firewall introduced, as well as netfilter, iptables realization
Date
: 2008-10-13
Size
: 52.68kb
User
:
sailflying
dankuyouhua
Downloaded:0
Reservoir operation in a single reservoir optimal scheduling process, scheduling the type of medium and long-term optimization.
Date
: 2008-10-13
Size
: 26.21kb
User
:
ningcx
jQuery1.2API
Downloaded:0
Nothing to say, jQuery 1.2 API Chinese version
Date
: 2008-10-13
Size
: 163.66kb
User
:
viki
GetPwd
Downloaded:0
This is a user input password interception procedures, through the program can obtain the password.
Date
: 2008-10-13
Size
: 10.16kb
User
:
ningcx
conv
Downloaded:0
Combination of a series of questions will be translated into the syntax of inheritance to be resolved, the issue of succession with the syntax to achieve portfolio.
Date
: 2008-10-13
Size
: 1.7kb
User
:
eachgear
aa
Downloaded:0
Caesar the process of password, and then matching the letters to replace the original message encryption letters displacement (shift cipher): modulus calculation. Ek (x) = (x+ K) mod 26, Dk (y) = (y-k) mod 26, such as: k
Date
: 2008-10-13
Size
: 5.54kb
User
:
李艳
S3C2510_uClinux_2.4.20_Install_Guide
Downloaded:0
S3C2510 transplant of uClinux guidance document. Version 2.4.20, there is a need to refer to the comrades.
Date
: 2008-10-13
Size
: 362.46kb
User
:
kevinzhao
«
1
2
...
.67
.68
.69
.70
.71
15072
.73
.74
.75
.76
.77
...
16274
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.