Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - 加密软件
Search - 加密软件 - List
《加密与解密》第二版电子版 随书光盘(一)演示部分 2003年 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。从光盘上拷贝文件到硬盘时,要注意改变文件属性,取消“只读”属性。-"encryption and decryption," the second edition of the electronic version of books on CD-ROM (a) demonstration of some 2003 in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology. From the CD copy files to the hard drive, the at
Date : 2025-12-27 Size : 15.6mb User : 张淼

《加密与解密》随书光盘(二)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (2) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-27 Size : 13.81mb User : 张淼

《加密与解密》随书光盘(三)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (3) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-27 Size : 10.66mb User : 张淼

《加密与解密》随书光盘(四)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (4) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-27 Size : 18.48mb User : 张淼

《加密与解密》随书光盘(五)习题 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (5) Exercise of the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-27 Size : 11.67mb User : 张淼

DL : 0
软件加密与破解秘笈,想学破解的朋友有用了,不过对开发者也有用的,做到知彼知已吗!-encryption software and crack secret, like the crack of the useful friends, but also to the development of useful, do itself has yet know!
Date : 2025-12-27 Size : 22.43mb User : RedFlag

软件加密技术,软件加密的方法和现有的技术,以及一些方法的实现-software encryption technology, software encryption methods and the existing technology, as well as some methods of achieving
Date : 2025-12-27 Size : 2.9mb User : 邱方奎

加密与解密,是软件密码学的经典书籍,循序渐进的深入介绍了加密与解密技术。-Encryption and decryption, cryptography software classic books, step-by-step in-depth introduction of the encryption and decryption technology.
Date : 2025-12-27 Size : 29.3mb User : 我怕升级

DL : 0
软件破解入门教程和解密常用手册.chm 本教程目前正在完善过程中,为了方便大家的平时学习,特将教学制成CHM格式以方便大家。(这份教学是将主页2001年12月25日之前内容打包)。本站下一步发展方向将与大家共同探讨一些新的加解密技术,侧重逆向工程与软件加密保护方面。   本电子教程是为方便网友查询,将部分手册之类的资料整理,遵循简洁、实用的原则。   如你想系统地学习加解密知识,请参考由本站与广大网友合作推出的新书《加密与解密--软件保护技术及完全解决方案 》,本书全面介绍Windows下软件的保护与破解技术,内容全面,讲解详细,配套光盘备有实战习题,适合各位爱好者使用。-err
Date : 2025-12-27 Size : 1.87mb User : liuyi

DL : 0
本书以新一代Pentium系列微处理器和MASM 6.1X为背景,全面系统地叙述了16/32位PC汇编语言程序设计方法和最新知识与技术。全书共12章,分为三个层次:基本原理方法篇(第一~六章)介绍了Pentium工作方式和扩展技术,16/32位寄存器,存储寻址机制,指令寻址与指令系统,汇编语法与伪指令,顺序分支和循环程序设计,子程序嵌套与违归及COM文件的编制。程序设计应用篇(第七~十章)介绍了表处理的排序检索,加密、解密,磁盘文件管理,时钟与驻留,BIOS中断调用技术,机器人图形动画,输入/输出接口程序,异步通信,汇编语言与高级语言的混合编程。知识拓展技术篇(第十一~十二章)介绍了分段、分页管理与多任务保护机制,实方式与保护方式切换示例,虚拟86方式的使用程序,多媒体汇编MMX和SSE指令及其编程设计与优化处理等。通过程序示例与软件工具用法示范以及附录列表,说明了如何进行软件开发。各章之后均附有适量的习题。该书体系结构逐层推进,层内循序渐进;融会多年教学研究成果,内容新颖丰富,重点突出学用结合;教学内容易于教师和学生根据实际层次水平按需组合。 -err
Date : 2025-12-27 Size : 4.71mb User : 传奇

DL : 0
数据加密软件,用来把一个文件夹加密,非常好用-a good software
Date : 2025-12-27 Size : 796kb User : fairy

软件加密解密技术内幕 PE文件格式深入研究-Software encryption and decryption technology insider-depth study of PE File Format
Date : 2025-12-27 Size : 1.33mb User : he

关于加密狗的一些资料,包括USB身份锁的强化识别、U盘等移动设备使用和管理中的风险问题、防跟踪USB接口加密狗的设计、基于驱动层的USB存储设备安全监控技术、一种USB软件加密狗的设计-Some of the information on the dongle, including enhanced USB lock to identify the identity, U disk and other mobile devices in use and management of risk issues, anti-tracking USB dongle interface design, based on the USB drive storage device layer security monitoring technology, a USB software dongle design
Date : 2025-12-27 Size : 927kb User : 傻莹

寒江独钓 这本书是一本专门介绍实时扫描的防毒软件、虚拟磁盘、硬盘还原、硬盘透明加密、文件透明加密、防火墙、反外挂、反窃取密码等软件的Windows内核模块开发的编程技术书。这本书的读者需要有C语言的基础。-This book is a book devoted to real-time scanning anti-virus software, virtual disk, hard disk restore, hard disk and transparent encryption, transparent file encryption, firewall, anti-plug-in, anti-steal passwords and other software for Windows kernel module programming techniques developed in the book. Readers of this book need to have C-basis.
Date : 2025-12-27 Size : 362kb User : 释小龙

DL : 0
专业PCB抄板软件QUICKPCB(加密狗版,一只类似U盘的加密狗插到电脑上即可运行程序),400/套,从手机主板到电脑主板,从工控板到高频板,从单面板到多层板,一切皆能轻松COPY。-Professional PCB copy board software QUICKPCB (dongle version of a similar U disk dongle can plug into a computer running the program), 400/set, from the phone to a computer motherboard motherboard, from the industrial control panel to the high-frequency board, from the single-sided to multilayer, all have encountered easily COPY.
Date : 2025-12-27 Size : 13kb User : linyi

DL : 0
于CMOS具有比磁盘更好的隐蔽性和正常DOS下的不可访问性,所以利用CMOS对软件进行加密是防止软件非法拷贝的一种方法。本文将重点介绍通过C语言利用CMOS对软件进行加密防止非法拷贝的实现方法。-Better than the disk in the CMOS with the hidden nature and the normal is not accessible under DOS, so the use of CMOS for software encryption to prevent unauthorized copying of software, one way. This article focuses on the use of CMOS through the C language the software is encrypted to prevent illegal copying of the realization method.
Date : 2025-12-27 Size : 7kb User : steven

开发者的加密技术,本书主要对软件开发者提供加密技术向导-Cryptography for Developers, the book mainly for software developers to provide encryption wizard
Date : 2025-12-27 Size : 2.73mb User : lee

本教程目前正在完善过程中,为了方便大家的平时学习,特将教学制成CHM格式以方便大家。(这份教学是将主页2001年12月25日之前内容打包)。本站下一步发展方向将与大家共同探讨一些新的加解密技术,侧重逆向工程与软件加密保护方面。-This tutorial is currently perfecting the process, usually for the convenience of our study, especially the teaching CHM format is made to facilitate you. (This teaching is the home on Dec. 25, 2001 the contents of package before). The direction of future development site and we will discuss some new encryption technology, focusing on reverse engineering and software encryption protection.
Date : 2025-12-27 Size : 1.87mb User :

产品描述 ◆ SOC芯片,性价比极高,质量稳定,内置WiFi协议栈和串口传输协议, 接口信号5V、地、RX 、TX 四线连接; ◆ 模块简洁、体积小,22*60*7 mm; ◆ 用户接口开发简单快捷,串口驱动 ; ◆ MSC51/PIC/ARM7 等 8、32 位单片机轻易驱动,驱动代码极少; 产品参数 ◆ 支持UART数据接口,波特率:19.2k / 38.4k / 57.6k / 115.2k bps ; ◆ 无线数据速率支持802.11b,最高速率11M ; ◆ 集成802.11 MAC协议软件功能; ◆ 支持基础网络中的STA 应用; ◆ 支持OPEN/WEP方式的鉴权; ◆ 支持共享密钥方式的wep64/wep128 数据加密传输; ◆ 在自动联网模式下,模块能自动扫描目标网络,断线自动重连 ; ◆ 在手动联网模式下,通过命令触发连接和断开,用户灵活控制; ◆ 支持RAW/UDP/TCP格式的网络数据传输; ◆ 支持7 组基本参数设置,最多可以连接7 个目的网络; ◆ 支持通过用户接口进行参数配置; ◆ 支持固件程序通过网络在线升级; ◆ 支持外接天线,UFL接口,发射功率最大100mW,接收灵敏度-90dBm -Main Function   Support for UART data serial, four baud rate options: 19200/38400/57600/115200bps.   Wireless data rates support the 802.11b Standard, the maximum rate is 11Mbps.   Integrate the functions of 802.11 MAC protocol Software.   Support for the STA appliances in the Infrastructure Network.   Support for the OPEN/WEP mode authentication.   Support for the wep64/wep128/ccmp/wpi data encryption transmission in the shared key mode   Support for the automatic networking mode and manual networking mode.   In the automatic networking mode,the module can automatically scan the target network, and automatically connect when disconnection.   In the manual networking mode,operation of connect and disconnect is touched off by order,this supports a flexible control space.   Support the network data transmission in RAW/UDP/TCP format. &#
Date : 2025-12-27 Size : 541kb User : Jacky

该木马为一种新型的通过短信控制用户电话的Android恶意软件。采用类名混淆技术来阻碍对恶意软件的逆向分析,安装后并没有在应用程序包中显示图标,应用程序的包图标为Google图标,目的是隐藏其恶意行为。然后木马为受害设备开启一个后门,通过设置高优先级的短信接收器,来拦截短信,监听特制的SMS消息查看是否是其远控指令的开启密码,密码采用MD5等技术加密,若密码匹配成功,则拦截短信,进一步等待远程控制指令- analysis of documents of the Trojans on android
Date : 2025-12-27 Size : 1.35mb User : quanfang lu
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.