CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - directory
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - directory - List
[
Crack Hack
]
RAS加密解密
DL : 0
RAS加密机密的dotnet例子,在TEMP目录下有PublicKey.dat和privateKey.dat为公钥和私钥-RAS encryption of confidential dotnet example, TEMP directory in a PublicKey.dat for public key and privateKey.dat and private key
Date
: 2008-10-13
Size
: 11.11kb
User
:
杨微
[
Crack Hack
]
filepassword
DL : 0
使用VC编写的文件操作类FileTool,主要有四个函数: //加密文件,输入参数为文件名,采用了BlowFish加密算法 BOOL EncryptFile(char * pFileName) //解密文件,输入参数为文件名 BOOL DeCryptFile(char * pFileName) //对某一目录下的文件打包,包括子目录,采用了LZARI压缩算法 BOOL Archieve(char * dir, char * arch) BOOL UnArchieve(char * arch, char * dir) 希望这些资料给广大网友带来便利! 本程序为网上下载-use of the documents prepared by the VC operation FileTool category has four main functions : / / encryption, the input parameters for file names, use the BlowFish encryption algorithm BOOL EncryptFile (char * pFileName) / / declassified document and the document input parameters were BOOL DeCryptFile (char * pFileName ) / / directory to a package of documents, including subdirectories, using a compression algorithm BOOL LZARI Archieve (char * dir, char * arch) BOOL UnArchieve (char * arch, char * dir) hope that such information for the majority of netizens bring convenience! this procedure downloading
Date
: 2008-10-13
Size
: 22.02kb
User
:
丁建军
[
Crack Hack
]
DES2
DL : 0
DES加密程序,VC环境下,如有错误,请修改目录-DES encryption program, VC environment, if wrong, please change directory
Date
: 2008-10-13
Size
: 77.79kb
User
:
zhu
[
Crack Hack
]
NEWMD5
DL : 0
最新perl语言MD算法程序,可以直接考入lib目录下应用-latest perl language MD algorithm procedures can be directly entered the lib directory application
Date
: 2008-10-13
Size
: 970byte
User
:
canoe
[
Crack Hack
]
SDES_VC++
DL : 0
S-DES加密算法输入为一个8位的明文组和一个10位的密钥,输出为8位的密文组,解密算法的输入则是一个8位的密文组和一个10位的密钥,输出位8位的明文组。解密过程是加密的逆。程序使用:读入一个文档文件,对其内容加密,输入密钥和选定存放生成密文的目录,点加密;解密操作与加密相似。-S-DES encryption algorithm for the importation of an eight expressly group and a 10 Key, Output for the eight-man group of close, decryption algorithm input is a secret eight-man group and one of the ten key, Output-8 group of expressly. Encryption and decryption is the inverse. Procedure : Reading into a document file, its content encryption, and the importation of selected key storage generating ciphertext directory, point encryption; Encryption and decryption operations similar.
Date
: 2008-10-13
Size
: 37.85kb
User
:
linvg
[
Crack Hack
]
v5395_iword
DL : 0
Iword2004 文档控件源码 1,控件支持全部Office菜单,支持Office的打印预览,控件强大的B/S通讯技术。 2,能够将服务器数据库中的数据或者用户自定义的数据插入当前文档的指定位置。 3,可以将文档中的指定数据随时保存到服务器数据库或者指定的目录中。 4,控件能够在浏览器窗口中直接编辑Word文档并保存到Web服务器上,实现文档和数据库的统一管理。 5,控件同时支持痕迹保留,手写签名,电子印章等办公自动化系统必备的功能。 6,控件采用标准HTTP协议,支持任意后台Web服务器。 7,任意后台编程语言(Asp,c,c++, Jsp,vb, Php,VB.NET,C#.NET等) 8,大量的接口函数,全面支持二次开发 -Iword2004 a source document control, the control supports all the Office menu, Office support the Print Preview Control powerful B / S communications technology. 2, the database server to the data or user-defined data into the current document, the designated location. 3, the document can be specified at any time to preserve data to the database server or the designated directory. 4, the controls in the browser window directly edit and save Word documents to the Web server, Documents and databases to achieve the unified management. 5, traces control while supporting reservations, handwritten signatures, electronic seals of office automation system and other necessary functions. 6, controls the use of standard HTTP protocol support arbitrary background of a Web server. 7, arbitrary backgrou
Date
: 2008-10-13
Size
: 251.09kb
User
:
宋雅彧
[
Crack Hack
]
jiamiyujiem123i
DL : 0
测试流程 首次运行release目录下的ghdkh.exe,会提示你注册。之后运行注册机,将注册机产生的客户号记下。运行解密机,将客户号填入,按下“生成解密钥”按钮,你会看到生成的解密钥。在此运行注册机,将解密钥填入,注册即会成功。 再运行ghdkh.exe,你会发现一切正常了。 源代码说明 共享软件作者一直和盗版作着斗争,对于与初出茅庐的程序员来说,对软件的加密和解密还很陌生,本例子将向这些人展示了共享软件加密和解密的一般技术。这些技术很简单,但只要大家动脑筋,就会从其中发掘出很多有用的东西。 -flow test release first run in the directory ghdkh.exe will prompt you for registration. After running RI, the customer record. Operation declassified plane to customers, Enter, press the "Generation Solution Key" button, you will see the solution generated key. In this operating RI, will fill key solutions, registration will be successful. Ghdkh.exe running again, you will find everything to normal. Note the source code sharing software piracy and the author has made the struggle, and novice programmers, right software encryption and decryption is still unfamiliar, The examples will show these people sharing software encryption and decryption of the technology in general. These technologies are simple, but as long as we have brains, which will be excavated from the many usef
Date
: 2008-10-13
Size
: 255.46kb
User
:
刘三
[
Crack Hack
]
sting
DL : 0
Windows98平台的共享目录口令暴力破解程序,多线程协同工作的例子。-Windows98 platform for the sharing of violence directory password cracking program, multithreaded work together examples.
Date
: 2008-10-13
Size
: 28.9kb
User
:
鲁锐
[
Crack Hack
]
sdestt
DL : 0
S-DES的编程实现 S-DES的加密使用8位明文和10位密钥做为输入,产生8位的密文做为输出。加解密使用相同的密钥。要求:采用CBC模式对文本加解密 1.对话界面:选择加密或解密,输入密钥,在目录中选择明文或密文文件(内容为二进制,.txt文件,),提示加密或解密完成 2.输出:产生密文文本或明文文本 3.提供:说明文档,源码,可执行程序,通过加密实验,给出运行结果. 4.提交分析雪崩效应文档:相同密钥下明文改变任一位时密文的位差异情况 相同明文下密钥改变任一位时密文的位差异情况-S-DES Programming S-DES encryption using 8 and 10 expressly as a key input, have eight of dense text as output. Encryption and decryption using the same key. Requirements : CBC mode to a declassified version increases. Dialogue interface : Select encryption or decryption key input in the directory option expressly or dense text document (for binary content,. Txt file,), suggesting encryption or decryption completed 2. Output : produce dense text or text the text expressly 3. provide : documentation, source code, executables, through encryption experiment is running results. 4. analytical avalanche effect Document : Key under the same as an explicit change the text at the close of the differences in the same place where expressly as a key change at the potentiometer ciphertext the situation
Date
: 2008-10-13
Size
: 2.23kb
User
:
冯鋆
[
Crack Hack
]
DES算法源代码
DL : 0
除了上面提到的压缩方法,你也可以调用VB的工具MakeCab.exe(在VB5\\setupkit\\kitfil32或VB98\\Wizards\\PDWizard目录下)生成.cab文件。先构造一个Directive 文件(*.ddf),然后使用Shell命令调用MakeCAB /f excel.ddf就可以生成*.cab文件。关于Directive 文件的格式,可以参考MSDN Library中的《MakeCAB: A Compression and Disk Layout Tool》一文。 -addition to the above-mentioned methods of compression, you can call VB Tools MakeCab.exe (VB5 \\ setupkit \\ kitfil32 or VB98 \\ Wizards \\ PDWizard directory) production. Cab document. First constructed a Directive document (*. DDF), then use the Shell order call MakeCAB / f excel.ddf can generate *. cab documents. Directive on the document format, they can refer to the MSDN Library "MakeCAB : A Disk Compression and Layout Tool," a text.
Date
: 2008-10-13
Size
: 3.93kb
User
:
田强
[
Crack Hack
]
sting
DL : 0
Windows98平台的共享目录口令暴力破解程序,多线程协同工作的例子。-Windows98 platform for the sharing of violence directory password cracking program, multithreaded work together examples.
Date
: 2025-12-30
Size
: 34kb
User
:
鲁锐
[
Crack Hack
]
sdestt
DL : 0
S-DES的编程实现 S-DES的加密使用8位明文和10位密钥做为输入,产生8位的密文做为输出。加解密使用相同的密钥。要求:采用CBC模式对文本加解密 1.对话界面:选择加密或解密,输入密钥,在目录中选择明文或密文文件(内容为二进制,.txt文件,),提示加密或解密完成 2.输出:产生密文文本或明文文本 3.提供:说明文档,源码,可执行程序,通过加密实验,给出运行结果. 4.提交分析雪崩效应文档:相同密钥下明文改变任一位时密文的位差异情况 相同明文下密钥改变任一位时密文的位差异情况-S-DES Programming S-DES encryption using 8 and 10 expressly as a key input, have eight of dense text as output. Encryption and decryption using the same key. Requirements : CBC mode to a declassified version increases. Dialogue interface : Select encryption or decryption key input in the directory option expressly or dense text document (for binary content,. Txt file,), suggesting encryption or decryption completed 2. Output : produce dense text or text the text expressly 3. provide : documentation, source code, executables, through encryption experiment is running results. 4. analytical avalanche effect Document : Key under the same as an explicit change the text at the close of the differences in the same place where expressly as a key change at the potentiometer ciphertext the situation
Date
: 2025-12-30
Size
: 2kb
User
:
冯鋆
[
Crack Hack
]
DES算法源代码
DL : 0
除了上面提到的压缩方法,你也可以调用VB的工具MakeCab.exe(在VB5\setupkit\kitfil32或VB98\Wizards\PDWizard目录下)生成.cab文件。先构造一个Directive 文件(*.ddf),然后使用Shell命令调用MakeCAB /f excel.ddf就可以生成*.cab文件。关于Directive 文件的格式,可以参考MSDN Library中的《MakeCAB: A Compression and Disk Layout Tool》一文。 -addition to the above-mentioned methods of compression, you can call VB Tools MakeCab.exe (VB5 \ setupkit \ kitfil32 or VB98 \ Wizards \ PDWizard directory) production. Cab document. First constructed a Directive document (*. DDF), then use the Shell order call MakeCAB/f excel.ddf can generate*. cab documents. Directive on the document format, they can refer to the MSDN Library "MakeCAB : A Disk Compression and Layout Tool," a text.
Date
: 2025-12-30
Size
: 4kb
User
:
田强
[
Crack Hack
]
RAS加密解密
DL : 0
RAS加密机密的dotnet例子,在TEMP目录下有PublicKey.dat和privateKey.dat为公钥和私钥-RAS encryption of confidential dotnet example, TEMP directory in a PublicKey.dat for public key and privateKey.dat and private key
Date
: 2025-12-30
Size
: 37kb
User
:
杨微
[
Crack Hack
]
filepassword
DL : 0
使用VC编写的文件操作类FileTool,主要有四个函数: //加密文件,输入参数为文件名,采用了BlowFish加密算法 BOOL EncryptFile(char * pFileName) //解密文件,输入参数为文件名 BOOL DeCryptFile(char * pFileName) //对某一目录下的文件打包,包括子目录,采用了LZARI压缩算法 BOOL Archieve(char * dir, char * arch) BOOL UnArchieve(char * arch, char * dir) 希望这些资料给广大网友带来便利! 本程序为网上下载-use of the documents prepared by the VC operation FileTool category has four main functions :// encryption, the input parameters for file names, use the BlowFish encryption algorithm BOOL EncryptFile (char* pFileName)// declassified document and the document input parameters were BOOL DeCryptFile (char* pFileName )// directory to a package of documents, including subdirectories, using a compression algorithm BOOL LZARI Archieve (char* dir, char* arch) BOOL UnArchieve (char* arch, char* dir) hope that such information for the majority of netizens bring convenience! this procedure downloading
Date
: 2025-12-30
Size
: 22kb
User
:
丁建军
[
Crack Hack
]
DES2
DL : 0
DES加密程序,VC环境下,如有错误,请修改目录-DES encryption program, VC environment, if wrong, please change directory
Date
: 2025-12-30
Size
: 78kb
User
:
zhu
[
Crack Hack
]
VNCDump
DL : 0
VNC Password and Port Dump This a simple program that just dumps the encrypted VNC password on the screen and also saves it in a file in the directory as where the binarie is located. We thought about the idea to also let it decrypt but for that you can also use X4.exe availible from: http://www.phenoelit.de/-VNC Password and Port Dump This a simple p rogram that just dumps the encrypted VNC passwo rd on the screen and also saves it in a file in the d irectory as where the binarie is located. We tho ught about the idea to also let it decrypt but for that you can also use X4.exe availible from : http://www.phenoelit.de/
Date
: 2025-12-30
Size
: 6kb
User
:
小李
[
Crack Hack
]
NEWMD5
DL : 0
最新perl语言MD算法程序,可以直接考入lib目录下应用-latest perl language MD algorithm procedures can be directly entered the lib directory application
Date
: 2025-12-30
Size
: 1kb
User
:
canoe
[
Crack Hack
]
SDES_VC++
DL : 0
S-DES加密算法输入为一个8位的明文组和一个10位的密钥,输出为8位的密文组,解密算法的输入则是一个8位的密文组和一个10位的密钥,输出位8位的明文组。解密过程是加密的逆。程序使用:读入一个文档文件,对其内容加密,输入密钥和选定存放生成密文的目录,点加密;解密操作与加密相似。-S-DES encryption algorithm for the importation of an eight expressly group and a 10 Key, Output for the eight-man group of close, decryption algorithm input is a secret eight-man group and one of the ten key, Output-8 group of expressly. Encryption and decryption is the inverse. Procedure : Reading into a document file, its content encryption, and the importation of selected key storage generating ciphertext directory, point encryption; Encryption and decryption operations similar.
Date
: 2025-12-30
Size
: 38kb
User
:
linvg
[
Crack Hack
]
jiamiyujiem123i
DL : 0
测试流程 首次运行release目录下的ghdkh.exe,会提示你注册。之后运行注册机,将注册机产生的客户号记下。运行解密机,将客户号填入,按下“生成解密钥”按钮,你会看到生成的解密钥。在此运行注册机,将解密钥填入,注册即会成功。 再运行ghdkh.exe,你会发现一切正常了。 源代码说明 共享软件作者一直和盗版作着斗争,对于与初出茅庐的程序员来说,对软件的加密和解密还很陌生,本例子将向这些人展示了共享软件加密和解密的一般技术。这些技术很简单,但只要大家动脑筋,就会从其中发掘出很多有用的东西。 -flow test release first run in the directory ghdkh.exe will prompt you for registration. After running RI, the customer record. Operation declassified plane to customers, Enter, press the "Generation Solution Key" button, you will see the solution generated key. In this operating RI, will fill key solutions, registration will be successful. Ghdkh.exe running again, you will find everything to normal. Note the source code sharing software piracy and the author has made the struggle, and novice programmers, right software encryption and decryption is still unfamiliar, The examples will show these people sharing software encryption and decryption of the technology in general. These technologies are simple, but as long as we have brains, which will be excavated from the many usef
Date
: 2025-12-30
Size
: 389kb
User
:
刘三
«
1
2
3
4
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.