Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
文本文件转换成PDF文件并加密-text files into PDF files and encryption
Date : 2008-10-13 Size : 1.13mb User : 金清

传统加密解算法,用置换来对文件进行处理,实用方便-traditional encryption/decryption algorithm, it s practicality and conveniency for introducing swaping to process file
Date : 2008-10-13 Size : 362kb User : 李户

功能强大的API,其中一些很值得参考,涵盖了打印,文件系统,声音,游戏,网络,字符串,加密,等真的很好用。-powerful API, which is worth some reference, covering print, file systems, sound, games, networking, string encryption, such as really good use.
Date : 2008-10-13 Size : 85.03kb User : 扬厉

其实网上已经有不少现成的软件,它们可以帮你做到一些共享软件的时间控制,比如试用30天,试用100次等。前些天给台湾人写的软件现在需要要一个试用版,由于是繁体,想用网上已有的软件<<幻影加密系统>>来做,但在繁体下一运行就把机子搞死了,害得我新装了繁体2000。后来想想还是自己写算了。-fact, there has been much off-the-shelf software, they can help you do some of the time-sharing software control, such as the 30-day trial, the trial 100 inferior. A few days ago the people of Taiwan to write software now needs to be a trial version, as is traditional, has been to use the Internet software lt; Lt; Mirage encryption system gt; Gt; To do, but in the next run put traditional loom die for, depriving me of the traditional design of 2000. Then think about or just write themselves.
Date : 2008-10-13 Size : 7.39kb User : 赵长华

此为本书的配套光盘.本书结合实例,重点讲述了软件加密技术及其实施方案,以帮助程序员更好地保护自己的软件。书中介绍了相关系统的底层知识,例如,PE格式深入分析,调试API应用,未公开技术SEH的深入研究等,从而使读者在了解这些底层知识后,可以应用到自己的软件保护方案如各种反跟踪技术的实现中。本书还首度公开了如何编写加壳软件,以及如何将壳与程序融合在一起等一些热门技术。本书由加密解密技术界一流高手共同打造,读者将从本书中获得许多极具商业价值的内幕技术,是专业开发人员不可多得的一本好书。-this be supporting the CD. The book combines examples highlight of the software encryption technology, and its implementation program to help programmers to better protect their software. The book introduced the relevant knowledge of the underlying system, for example, PE format for in-depth analysis and debugging API application, but SEH undisclosed technology in-depth research, thus allowing readers to understand the underlying knowledge, can be applied to their own software to protect various programs, such as anti-tracking technology realization. The book is also the first time publicly how to prepare shell software, and how to shell and procedures for the integration of some other hot technology. The book by the encryption and decryption technology community together to create a first
Date : 2008-10-13 Size : 3.5mb User : 陶立欣

这是一个简单的加密解密程序,其中有加密和解密函数各一个,注意其中的文件调用,特别是它的路径。-This is a simple encryption and decryption procedures, which have encryption and decryption function of the 1, to call the document, particularly its path.
Date : 2008-10-13 Size : 934byte User : yata

DL : 0
有保存/装载能力的简单加密程序。This is a simple encryption program with save/load capability.-have preservation / loading capacity of a simple encryption program. This is a simple encryption program with save / load capability.
Date : 2008-10-13 Size : 7.42kb User : 苏建新

vc开发的PCI总线加密卡 PCI开发卡主要由PCI9054、93C56、16M晶振和相应的跳线、控制地址数据线等部分组成。PCI9054是PLX公司的PCI主模式桥芯片,具体芯片的说明请见Data Book;93C56是EERPOM,用于向PCI9054的初始化设置信息;16M晶振向9054提供总线时钟和CPLD7128S提供时钟;跳线用于PCI9054的设置,控制地址数据线将PCI9054的Local Bus信号线引出来,用于实验板用。-vc development of the PCI bus card encryption PCI card developed by PCI9054, 93C56, 16M crystal and the corresponding patch cords, control address data line components. PLX PCI9054 is the main mode PCI bridge chip, specific chip See Note Data Book; 93C56 is EERPOM, used to PCI9054 initialization information; 16M crystal oscillator to provide 9,054 CPLD7128S Bus clock and clock; Jumper settings for the PCI9054, control data lines to address the PCI9054 Local Bus signal line leads, the board used for experiments.
Date : 2008-10-13 Size : 849.36kb User : 万宴宾

PCI数据加密技术源码 加密过程: 以明文字母选择列,以密钥字母选择行,两者的交点就是加密生成的密文。 解密过程: 以密钥字母选择行,从中找到密码文字母,密码文字母所在列的列名即为明码文字母-PCI data encryption technology source encryption process : choose to express out letters to key letters choose OK, The intersection of the two is encrypted ciphertext generated. Decryption : The Key to select letters, find passwords alphabet. Password alphabet which included the names of the alphabet namely codes
Date : 2008-10-13 Size : 60.95kb User : 万宴宾

ASP简单的MD5不可逆加密和可逆加密(时间)-ASP simple MD5 encryption is not reversible and reversible encryption (time)
Date : 2008-10-13 Size : 3.42kb User : 函繁

java 实现对3DES 的加密.-3DES encryption.
Date : 2008-10-13 Size : 3.09kb User : 图南

获取IDE磁盘的型号、序列号,非常适合做软件加密,让自己的软件更安全-access IDE disk model, serial number, very suitable for encryption software, so their software more secure!
Date : 2008-10-13 Size : 6.67kb User : 夏静

DL : 0
用于加密/解密的代码,以ATL形式提供,大家一看便知-for encryption / decryption code to the form of ATL, we look at what is happening in a
Date : 2008-10-13 Size : 114.06kb User : an

DL : 0
加密用,可惜只能加密字符,不能加密汉字-use encryption, but encryption characters only, not encrypted Chinese characters
Date : 2008-10-13 Size : 4.74kb User : 隼龙

DL : 0
这是一款用来给asp代码加密和解密的工具 由于现在好多的代码都是加密的所以这个软件非常好用-this is a code used to asp encryption and decryption tool because now a lot of the code are encrypted so the software is very handy
Date : 2008-10-13 Size : 43.8kb User : siyu

DL : 0
根据硬盘序列号和cpu序列号进行加密解密处理。-drive serial number and serial number cpu for encryption and decryption processing.
Date : 2008-10-13 Size : 612.19kb User : 苏淼

DL : 0
加密 加密 加密 -encryption En cryption En cryption En cryption En cryption En cryption Encryption
Date : 2008-10-13 Size : 30.86kb User : okde

DL : 0
一个简单的文件加密解密例子 -a simple document encryption and decryption example of a simple document encryption and decryption case
Date : 2008-10-13 Size : 1.74kb User : JACK

DL : 1
Windows优化大师 6.5 Build 5.124 更新如下: 1、修正了Windows文件加密的一处错误。 2、改进了系统信息检测。 (1)、改进了存储系统检测。 (2)、改进了处理器信息检测。 3、改进了网络系统优化。修正了优化参数,改进了IE与其它设置模块。 4、改进了冗余动态链接库清理。该模块改进为一个独立的线程。 5、改进了垃圾文件清理。 (1)、垃圾文件清理模块改进为多线程方式。 (2)、重复文件分析模块改进为多线程方式。 6、改进了注册表清理。修正了与一款制图软件的兼容性。 7、改进了系统个性设置。全面改进了右键设置模块。 8、改进了备份与恢复管理模块。 9、改进了其它设置选项中的界面设置模块。 10、改进了开机速度优化。 -Masters optimize Windows 6.5 Build 5.124 updated as follows : an amendment of the Windows file encryption of a mistake. 2, improved detection system information. (1) to improve the storage system detection. (2), a processor of information to improve detection. Three, improve the network system optimization. Amendments to the optimization parameters, improved Internet Explorer and other setup module. 4, improved redundancy DLL liquidation. The module to improve a separate threads. 5, improved garbage clean-up document. (1), garbage clean-up module to improve documentation for multiple threads. (2), repeat the analysis module for improved multi-threaded approach. 6, improved registry cleaning. With the new amendments to the mapping software compatibility. 7, improve the system installed pers
Date : 2008-10-13 Size : 3.22mb User : 江露

加密解密程序,实现了加密解密功能,无解密密码-encryption and decryption procedures, achieving encryption and decryption functions, without decryption password
Date : 2008-10-13 Size : 6.23kb User : dhm
« 12 3 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.