Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - feature
Search - feature - List
DL : 0
非常简单却实用的一款通讯簿,主要特色是支持密码保护功能,可以实现联系人信息的保密.-very simple but practical one Address Book, the main feature is support password protection function, Contact information can achieve confidentiality.
Date : 2008-10-13 Size : 143.8kb User : lailai

循环码是线性分组码中的一类重要字码。它具有纠错能力强和易于实现的特点,它适合于代数方法进行研究,编译码的设备也比较简单,再实际中得到了广泛的应用.-cycle linear block code is the code of a kind of important code. It has error correction capability and feature easy to implement, it is suitable for algebraic methods, encryption equipment is relatively simple, more practical be widely used.
Date : 2008-10-13 Size : 2.19kb User : chenxiang

DL : 0
非常简单却实用的一款通讯簿,主要特色是支持密码保护功能,可以实现联系人信息的保密.-very simple but practical one Address Book, the main feature is support password protection function, Contact information can achieve confidentiality.
Date : 2026-01-10 Size : 144kb User : lailai

循环码是线性分组码中的一类重要字码。它具有纠错能力强和易于实现的特点,它适合于代数方法进行研究,编译码的设备也比较简单,再实际中得到了广泛的应用.-cycle linear block code is the code of a kind of important code. It has error correction capability and feature easy to implement, it is suitable for algebraic methods, encryption equipment is relatively simple, more practical be widely used.
Date : 2026-01-10 Size : 2kb User : chenxiang

主要完成功能如下: 支持资源管理器的右键菜单; 支持加密和解密; 加密文件后缀为.lck,可直接双击解密并打开原始文件(如:你mm的照片,哈哈); -The main feature is as follows: Support Resources Manager menu support for encryption and decryption encrypted file suffix to. Lck, can directly double-click decrypt and open the original document (such as: Do you mm photos, ha ha)
Date : 2026-01-10 Size : 48kb User : conku

DL : 0
对文件加密解密 附带文件传输功能,感觉还可以哦!-Encryption and decryption of the document attached to the file transfer feature, the feeling can also be oh!
Date : 2026-01-10 Size : 3.85mb User : .g

DL : 0
用VC++实现了rsa算法,界面做的相当不错,功能也很强盗-With VC++ Achieved rsa algorithm, the interface to do a pretty good feature is also very bandit
Date : 2026-01-10 Size : 2.21mb User : 闫露生

DL : 0
目前使用最广泛的软件保护方法,我们可以将其分为两类:依赖硬件的保护文案和不依赖硬件的保护方案。依赖硬件的保护方案主要有:软盘保护,加密卡保护,软件锁保护(俗称“加密狗”)以及光盘加密等,这些方案的共同特点就是保护措施都要涉及某一具体的硬件来实现,涉及的硬件可能是软件盘,U盘,光盘或者其它外接设备-At present, the most widely used method of software protection, we can be divided into two categories: dependent on the protection of hardware and do not rely on hardware copy protection program. Rely on hardware protection programs include: a floppy disk protection, encryption card protection, software protection lock (commonly known as dongle ), as well as CD-ROM, such as encryption, a common feature of these programs is that protective measures should be involved in a specific hardware to achieve, involving The hardware may be the software disk, U disk, CD-ROMs or other external equipment
Date : 2026-01-10 Size : 579kb User : 姚磊

This book introduces standard C++ and the key programming and design techniques supported by C++. Standard C++ is a far more powerful and polished language than the version of C++ introduced by the first edition of this book. This book presents every major C++ language feature and the standard library. It is organized around language and library facilities.The primary aim of this book is to help the reader understand how the facilities offered by C++ support key programming techniques. The aim is to take the reader far beyond the point where he or she gets code running primarily by copying examples and emulating programming styles from other languages. Only a good understanding of the ideas behind the language facilities leads to mastery.
Date : 2026-01-10 Size : 2.85mb User : Di_Ablo

DL : 1
给应用程序加CRC效验的小工具的源码,加CRC效验,能防止软件被修改,该工具能实现自动添加功能。-CRC added to the application of well-tested source of small tools, plus CRC-tested, to prevent the software is modified, the tool can automatically add the feature.
Date : 2026-01-10 Size : 176kb User : 朱显章

des数据加密算法,其中的功能比较全,可以实现相关数据的加解密工作,适合初学者-des data encryption algorithms, all of which feature comparison can be achieved with data encryption and decryption work, suitable for beginners to see if
Date : 2026-01-10 Size : 587kb User : 林子

DL : 0
AES的加密实现,代码比较多,但是功能很全,满足各方面的需要-AES encryption implementation, code more, but the feature is full, meet all the needs of
Date : 2026-01-10 Size : 229kb User : suchongmao

This a comprehensive example demonstrating various modes of the Grid Control: * Basic Grid * Report Control * Virtual List and other Grid Control-related features: * various cell types * custom grid colors with different color themes * "merged cells" feature -This is a comprehensive example demonstrating various modes of the Grid Control: * Basic Grid * Report Control * Virtual List and other Grid Control-related features: * various cell types * custom grid colors with different color themes * "merged cells" feature
Date : 2026-01-10 Size : 2.96mb User : P.Sanmuk

DL : 0
DES文件加密,文本加密。并且在文件加密时有计时功能。-DES file encryption, text encryption. And the time when the file encryption feature.
Date : 2026-01-10 Size : 1.89mb User : hrong

使用AES256加密文件和文件夹内容的简易工具,文件也可以用SHA1签名做哈希加密,包含一个命令行版本和一个GUI版本,另外,也可以用于加密邮件的信息。-Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
Date : 2026-01-10 Size : 5.28mb User : mark

纠错算法功能包,实现简单的crc算法计算-Feature Pack correction algorithm to achieve a simple algorithm to calculate the crc
Date : 2026-01-10 Size : 9kb User : 罗海强

一个关于文件加密的程序!!!可以自己设定密码的!!!功能还可以吧!!!尽管-A file encryption program on! ! ! Can set their own password! ! ! Feature can also be it! ! ! Although the try! ! !
Date : 2026-01-10 Size : 1kb User : 张建萍

文件加密器,转码实现,非常实用的功能-File encryption devices, transcoding implementation, very useful feature.
Date : 2026-01-10 Size : 439kb User : 宝宝

置换密码亦称换位密码。置换只不过是一个简单的换位。每个置换都可以用一个置换矩阵 来表示。每个置换都有一个与之对应的逆置换 。置换密码的特点是仅有一个发送方和接收方知道的加密置换(用于加密)和对应的逆置换(用于解密)。它是对明文 长字母组中的字母位置进行重新排列,而每个字母本身并不改变。-Password replacement, also known as transposition cipher. Replacement is just a simple transposition. Each permutation can be represented by a permutation matrix. Each exchange has a corresponding inverse permutation. Replacement of the password feature is only one sender and receiver know the encryption permutation (for encryption) and the corresponding inverse permutation (for decryption). It is a long letter of the plaintext letters in the group re-arranged location, and each letter in itself does not change.
Date : 2026-01-10 Size : 1kb User : 张华

使用NET和CSharp编程,可以根据输入的模板格式和加密解密字符实现软件许可文件的自动生成-This article is about a license key generation program. As you know when you get a software package it usually requires a license key. The keys that are generated show various pieces of information, such as product, customer and version. With this program and library you can create the key and later read it in to validate that the correct key was used. This is used not only for selling commercial products but also in deploying enterprise applications. With a license key you can turn features on and off for each customer, have product feature expire at the end of a demo period, or any other type of enabling or disabling you desire. Since I wanted to put this code in CodeProject I adhered to using NUnit as my unit testing tool, NDoc as my documentation tool, and FxCop as my code analyzer. In this project, I created an interactive test tool to test the various features of the library.
Date : 2026-01-10 Size : 269kb User : 许慧
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.