Welcome![Sign In][Sign Up]
Location:
Search - CONFIDENTIAL

Search list

[Crack HackRAS加密解密

Description: RAS加密机密的dotnet例子,在TEMP目录下有PublicKey.dat和privateKey.dat为公钥和私钥-RAS encryption of confidential dotnet example, TEMP directory in a PublicKey.dat for public key and privateKey.dat and private key
Platform: | Size: 37888 | Author: 杨微 | Hits:

[Crack HackRijndael加密

Description: 对称钥匙的加密解密的例子,采用Rijndael机密算法-symmetric key encryption and decryption example, used confidential Rijndael algorithm
Platform: | Size: 25600 | Author: 杨微 | Hits:

[Windows CELeastSignificantBit__recover_Program

Description: LSB域的恢复算法,可以清晰的获得提取出来的保密信息。-LSB domain algorithm for the restoration, was clear from the confidential information.
Platform: | Size: 1024 | Author: 月光沙滩 | Hits:

[matlabworkkalmanfilter6

Description: 希望每一个使用本程序的人都能做到保密,因为这里的许多东西都是相当宝贵的,如果还有别的需要可以单独发邮件给我-hope every one use of the procedures people can be kept confidential, because many things here are very valuable, if there are other needs alone can send an email to
Platform: | Size: 19456 | Author: 高大旺 | Hits:

[GUI DevelopDESCodeDECODE

Description: 当今社会是信息化的社会。为了适应社会对计算机数据安全保密越来越高的要求,美国国家标准局(NBS)于1997年公布了一个由IBM公司研制的一种加密算法,并且确定为非机要部门使用的数据加密标准,简称DES(Data Encrypton Standard)。自公布之日起,DES算法作为国际上商用保密通信和计算机通信的最常用算法,一直活跃在国际保密通信的舞台上,扮演了十分突出的角色。现将DES算法简单介绍一下,并给出实现DES算法的VC源代码。 DES算法由加密、解密和子密钥的生成三部分组成。-society today is the information society. In order to adapt to society for computer data security and confidentiality of the increasingly high demand the National Bureau of Standards (NBS), released in 1997 by an IBM developed an encryption algorithm, identified departments use non-confidential data encryption standard short DES (Data Encrypton Standard). Since the date of publication, DES algorithm as an international business confidential communications and computer communications of the most commonly used algorithm, international has been active in the confidential communications on the stage to play a very prominent role. DES algorithm will now give a brief account, and gives DES algorithm to achieve the VC source. DES algorithm by encryption, decryption keys and sub-generated three co
Platform: | Size: 3446784 | Author: 吴权 | Hits:

[OS programdelphi+SQLstudent

Description: 点击安装数据库,即可导入SQL数据库,另外PC机要修改数据源,导入的数据库中有登陆密码-Click to install the database, you can import SQL database, another PC to amend confidential data sources, into the database login password
Platform: | Size: 1147904 | Author: 艾马尔 | Hits:

[Software Engineeringcisco1234

Description: Cisco宽带城域网解决方案总汇。属于保密文件!-Cisco Broadband Network Solutions pool. Is confidential documents!
Platform: | Size: 2315264 | Author: liu | Hits:

[Grid Computingyesadmin_com_2005112515349569

Description: 当今社会是信息化的社会。为了适应社会对计算机数据安全保密越来越高的要求,美国国家标准局(NBS)于1997年公布了一个由IBM公司研制的一种加密算法,并且确定为非机要部门使用的数据加密标准,简称DES(Data Encrypton Standard)。自公布之日起,DES算法作为国际上商用保密通信和计算机通信的最常用算法,一直活跃在国际保密通信的舞台上,扮演了十分突出的角色。现将DES算法简单介绍一下,并给出实现DES算法的VC源代码。 DES算法由加密、解密和子密钥的生成三部分组成。-society today is the information society. In order to adapt to society for computer data security and confidentiality of the increasingly high demand the National Bureau of Standards (NBS), released in 1997 by an IBM developed an encryption algorithm, identified departments use non-confidential data encryption standard short DES (Data Encrypton Standard). Since the date of publication, DES algorithm as an international business confidential communications and computer communications of the most commonly used algorithm, international has been active in the confidential communications on the stage to play a very prominent role. DES algorithm will now give a brief account, and gives DES algorithm to achieve the VC source. DES algorithm by encryption, decryption keys and sub-generated three co
Platform: | Size: 10240 | Author: qq | Hits:

[OpenGL programbasicvector

Description: 作者: junglesong 这是我过去进行一个OpenGL项目时使用到的"三维空间向量/点"类及相关函数,使用它们可以定义一个空间向量/点,实现向量的平移,缩放和旋转等,使用相关函数还可以实现两向量的叉乘,得到一个向量的绝对长度,将一个向量单位化,得到一个三点决定的平面的垂直向量(经过单位化),得到空间中两点的距离,得到两向量的点积,得到两向量的夹角等操作,为方便用户的使用,每个函数都有详细的注释,特别重要的向量计算如点积,叉乘还有相关说明,希望对大家有所用处. 由于源程序涉及到保密问题不能和盘托出,请见谅. junglesong@etang.com-Author : junglesong This is my last OpenGL for a project to use the "three-dimensional vector space/point "and related functions, they can use a definition of space vector/points, for the vector translation, zooming and rotation, using correlation function can also achieve two fork by Vector, a vector to be the absolute length of a vector unit, 3:00 been a decision of the vertical plane of Vector (those units), a space to be the distance between two points, Vector to be the two plot points, to be the angle between two vectors such operations, as a user-use, Each function has detailed notes, a particularly important point if the calculation vector plot, fork also took note, we hope to have useful. Due to the confidential source involved in the issue can not completely please b
Platform: | Size: 3072 | Author: 黄景天 | Hits:

[DocumentsDSP_apllication

Description: 基于DSP技术的保密通信方案设计.nh 很好的东东哦 -based on DSP technology confidential communications program design. Nh Oh good Dongdong
Platform: | Size: 4460544 | Author: wy | Hits:

[VxWorksvxworksBSPCORD

Description: vxworks 是调试用的核文件,不能烧写的FLASH里 vxWorks_romCompress.bin 是烧写到FLASH里的bin文件 IP 地址默认是 192.168.1.114 PC 机 要与开发板在同一网段才能通讯 在BIOS中启动vxworks很慢(由于没有开cache),要等10多秒用FLASHACCESS直接把vxworks 写进FLASH可以解决这个问题-vxworks use of nuclear documents not burning FLASH Lane vxWorks_romCompress.bin is burning to FL Lane joint effort of all advocates of the paper bin default IP address is 192.168.1.114 PC confidential and development on the same plate a network of communication can be activated in BIOS vxworks very slow (due to lack of open cache). have to wait more than 10 seconds with FLASHACCESS directly vxworks included FLASH can resolve this question
Platform: | Size: 953344 | Author: 饶敏 | Hits:

[Compress-Decompress algrithmsH263B

Description: h.263+ vc++商业源代码,具体公司名称保密!-h.263 vc commercial source code, specific company names confidential!
Platform: | Size: 72704 | Author: gao | Hits:

[Crack HackNetpassword

Description: Net框架由于拥有CLR提供的丰富库支持,只需很少的代码即可实现先前使用C等旧式语言很难实现的加密算法。本类实现一些常用机密算法,供参考。-Net framework, as they own CLR provides support for the rich, with little code can be used to achieve the old language, such as C is very difficult to achieve encryption algorithm. Realize some of the categories used confidential algorithm for information.
Platform: | Size: 2048 | Author: 韩冰 | Hits:

[OtherFlash345

Description: “闪存(Flash)”这一名称,是源于该存储器件只需单步操作即能擦除其中所有内容的能力。军用装备很早就从这一能力中获益,军用装备都包含机密信息,一旦即将落入敌手,就应该迅速予以破坏。与EEPROM类似,Flash的数据存储也是通过向其晶体管栅区存入电荷来实现。电荷在栅上的存储是通过注入一定量的电荷、让其穿过绝缘氧化层来实现的。-"Flash (Flash)," the name, Memory is from the pieces of only single-step operation that can be erased in which all content capabilities. Military equipment from the very early benefit from this capability, military equipment contain confidential information, once the upcoming fall into an opponent, it should be quickly destroyed. And similar EEPROM, Flash data storage as well as through its gate transistors deposited in the district charge is to be achieved. Gate charge in the store is injected through a certain amount of the charge, so through the insulating oxide layer to achieve.
Platform: | Size: 46080 | Author: 吕过 | Hits:

[Disk Toolswipefile

Description: 本代码按照DOD5220.22M标准来擦掉需要删除的机密数据,即首先将要删除的文件内容全部写为 0 ,再被写为 1 ,如此重复3次,接着被写上一个随机值;再加上一个DOD标准中未说明的步骤,即在删除文件之前,先将文件长度置为0,这使恢复机密文件的希望更为渺茫。-DOD5220.22M according to the code standards to wipe the need to remove confidential data, First, will be deleted all the content of the documents was made to 0, then wrote to a so repeat three times, are then written on a random value; coupled with a DoD standard unspecified steps to delete the file that is before given the length of documents home to 0, which makes restoring hope confidential documents of the more elusive.
Platform: | Size: 1024 | Author: aaa | Hits:

[Windows DevelopIPUpperSrc

Description: 安全ip保密ftp传输应用。 -security confidentiality ftp ip transmission. Ip security for transmission of confidential ftp.
Platform: | Size: 53248 | Author: | Hits:

[OtherOracleInstallforHPUX

Description: 主要介绍了ORACLE在HP-UX上的安装配置,是惠普比较保密的数据库安装配置手册-ORACLE introduced in the HP-user configuration on the installation, HP is more confidential database installation manual configuration
Platform: | Size: 99328 | Author: james | Hits:

[assembly languageAbsolute_Safe_File

Description: 使用汇编语言编写,将一个文件以忽略文件系统的RAW格式存入磁盘中。这意味着除了使用这个程 序,他人没有办法读取你的文件。对机密文件的保存非常有效!-use of assembly language, will be overlooked in a paper file system into the RAW format disks. This means that in addition to the use of this procedure, others can not read your paper. To keep confidential documents of the very effective!
Platform: | Size: 1024 | Author: 尤冉 | Hits:

[AlgorithmarithmeticofDESencrypt

Description: 提供高质量的数据保护,防止数据未经授权的泄露和未被察觉的修改; 具有相当高的复杂性,使得破译的开销超过可能获得的利益,同时又要便于理解和掌握; DES密码体制的安全性应该不依赖于算法的保密,其安全性仅以加密密钥的保密为基础; 实现经济,运行有效,并且适用于多种完全不同的应用。 -provide high-quality data protection to prevent unauthorized data disclosure and was not aware of the changes; have very high complexity, and makes deciphering the overhead may exceed the benefits, at the same time easy to understand and master; DES password security system should not depend on secrecy algorithm, the security of the encryption key only confidential basis. the realization of economic, operational, effective and applicable to many different applications.
Platform: | Size: 38912 | Author: 范孟君 | Hits:

[Bookscsharpcankaoshouce

Description: c#语言参考手册 本文并非最终文档,在最终的商业版本发布前,可能会有重大修改。而且,它属微软公司所有并且是机密。它是根据接受者和微软公司间的非公开协议公布的 。-c# language reference manual is not the ultimate documentation, in the final commercial release, there may be major changes. Moreover, it is Microsoft and all confidential. It is based on Microsoft recipient and the non-publicly announced the agreement.
Platform: | Size: 284672 | Author: qqzhw | Hits:
« 1 2 3 45 6 7 8 9 10 ... 16 »

CodeBus www.codebus.net