Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .03 .04 .05 .06 .07 708.09 .10 .11 .12 .13 ... 1660 »
Downloaded:0
watermark
Date : 2025-06-26 Size : 2kb User : zhang

Downloaded:0
IPSEC VPN for data encryption
Date : 2025-06-26 Size : 6kb User : 黄学汞

Downloaded:0
Text images, through encryption, using the Lorentz transformation, ie three-dimensional encryption program
Date : 2025-06-26 Size : 4.46mb User : 马郑列

Downloaded:0
Described in detail, MD5 digital signature to achieve the function code
Date : 2025-06-26 Size : 3kb User : driftage

Downloaded:0
A des base64 md5 encryption algorithm such as the realization of a variety of procedures have been tested, vc++6.0 to achieve, is applicable to any system
Date : 2025-06-26 Size : 1.9mb User : 王大傻

Downloaded:0
visual C++ implementation of the AES algorithm to encrypt data files can be
Date : 2025-06-26 Size : 2kb User : 王婧

Downloaded:0
This small software executable file by (. Exe) Add a new tail section (Section), and modify the entry address of PE, so that the executable file at run time, out of a password dialog box, in order to achieve a simple enc
Date : 2025-06-26 Size : 205kb User : 洋洋

Downloaded:0
this program is used to activate office
Date : 2025-06-26 Size : 314kb User : yuriyuri

Downloaded:0
Sound files on the timeline will be divided into paragraphs, each paragraph of the order and reversed the order of some paragraphs to realize the encryption of sound files. First, the first reading of a voice signal, the
Date : 2025-06-26 Size : 33kb User : yuanyuan

Downloaded:0
The original image in the horizontal direction and vertical direction and two filters (low pass, high pass) with convolution, you can get the original image area of 4 1/4 graph, respectively, horizontal and vertical dire
Date : 2025-06-26 Size : 1kb User : yuanyuan

Downloaded:0
DES algorithm used to encrypt the audio signal processing, mainly replacement and shift operations to achieve encryption.
Date : 2025-06-26 Size : 3kb User : yuanyuan

Downloaded:0
The most significant bits (LSB) method of DO is the secret data (watermark data) embedded into the data in the simplest way, which is hidden data in the time domain. Any secret data can be viewed as a string of binary bi
Date : 2025-06-26 Size : 1kb User : yuanyuan
« 1 2 ... .03 .04 .05 .06 .07 708.09 .10 .11 .12 .13 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.