Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program
OS program list
Sort by :
« 1 2 ... .20 .21 .22 .23 .24 15525.26 .27 .28 .29 .30 ... 16274 »
Downloaded:0
Rijndael algorithm using arbitrary file encryption. To arbitrary N of a document is divided into 16-byte groups, and finally a group of less than 16 bytes can be used to fill space!
Date : 2008-10-13 Size : 45.79kb User : 丁莉娜

Downloaded:0
With large numbers MIRACL library to achieve the shared computing software security register.
Date : 2008-10-13 Size : 307.56kb User : 丁莉娜

Downloaded:3
For Logistic mapping, a digital image iterative chaotic encryption algorithm is implemented
Date : 2008-10-13 Size : 170.82kb User : 丁莉娜

Downloaded:0
MIDAS-based multi-tier distributed application system, the sensitive data encrypted by the network transmission, the client re-use the corresponding decryption algorithm to solve the transmission in the process of securi
Date : 2008-10-13 Size : 643.94kb User : 丁莉娜

Downloaded:0
A band source as well as the presentation of taskbar controls, in the hope that a bit with everyone! Found from the Internet the!
Date : 2008-10-13 Size : 6.01kb User : noisc

Downloaded:1
under linux application development platform is a development board MagicARM2410 Ligong week (week of the Samsung Ligong development board), including threading, tcp protocol, udp agreement
Date : 2008-10-13 Size : 75.37kb User : 颜挺

Downloaded:0
DNS can get the source code! Simple interface, good procedures, suitable for beginners and analysis of learning!
Date : 2008-10-13 Size : 79.99kb User :

Downloaded:0
Peacetime learning linux command summary, and some are also some notes-source experience
Date : 2008-10-13 Size : 7.18kb User : 许威

Downloaded:0
Register optimized encryption module is worth learning a thing
Date : 2008-10-13 Size : 571.38kb User : 杨明

Downloaded:0
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemen
Date : 2008-10-13 Size : 9.46kb User : 刘博

Downloaded:0
From worms to download, delphi write, can learn about
Date : 2008-10-13 Size : 1.6kb User : 宁宇

Downloaded:0
Simple garbage collector I would like to try the effect of a good many times, please do so everyone
Date : 2008-10-13 Size : 4.1kb User : mayi
« 1 2 ... .20 .21 .22 .23 .24 15525.26 .27 .28 .29 .30 ... 16274 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.