Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .15 .16 .17 .18 .19 1520.21 .22 .23 .24 .25 ... 1660 »
Downloaded:0
ecc code, c++ prepared, but also good, but I do not look a bit, you can understand
Date : 2008-10-13 Size : 100.04kb User : 冰河

Downloaded:0
DES encryption algorithm is a popular encryption algorithm, and this source code is a demonstration program to implement DES encryption.
Date : 2008-10-13 Size : 12.48kb User : 李德

Downloaded:0
To the minimum version of visual studio 2005 run, after running the dialog box that appears, type the password in the following dialog box encryption you want to encrypt the content can be saved encrypted content, but al
Date : 2008-10-13 Size : 23.54kb User : 刘博

Downloaded:0
NPKCrypt the SDK, many games have been added to NP protection, QQ also have NP protection, there are many examples of using the SDK.
Date : 2008-10-13 Size : 931.6kb User : 向东

Downloaded:0
Rijndael algorithm using arbitrary file encryption. To arbitrary N of a document is divided into 16-byte groups, and finally a group of less than 16 bytes can be used to fill space!
Date : 2008-10-13 Size : 45.79kb User : 丁莉娜

Downloaded:0
With large numbers MIRACL library to achieve the shared computing software security register.
Date : 2008-10-13 Size : 307.56kb User : 丁莉娜

Downloaded:3
For Logistic mapping, a digital image iterative chaotic encryption algorithm is implemented
Date : 2008-10-13 Size : 170.82kb User : 丁莉娜

Downloaded:0
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemen
Date : 2008-10-13 Size : 9.46kb User : 刘博

Downloaded:0
Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
Date : 2008-10-13 Size : 262.63kb User : 梅三

Downloaded:0
Blowfish encryption algorithm, use before loading a document Blowfish.java
Date : 2008-10-13 Size : 874byte User : 李勃

Downloaded:0
Encryption, security, compression treatment, examples have lovers can learn
Date : 2008-10-13 Size : 67.78kb User : 王朱忠

Downloaded:0
Database access interface encryption algorithm source code may need to be adjusted according to algorithm
Date : 2008-10-13 Size : 25.13kb User : 雷天兆
« 1 2 ... .15 .16 .17 .18 .19 1520.21 .22 .23 .24 .25 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.