Welcome![Sign In][Sign Up]
Location:
Search - encryption on the fly

Search list

[OS programu1

Description: 基于U盘的身份认证-程序 随着科技的发展,IT技术的投飞猛进发展。优盘走进了普通计算机用户的手中,逐渐了取代了计算中的软驱的位置。现在的优盘生产厂家较多、价格比较低廉、稳定性较高、容量较大、功能也越来越多。使用计算机用户手中的优盘设备作为加密载体是最合适的选择。因为不需要任何软件商的投资,不用担心核心技术的控制。最为软件厂商的工作就是开发一套基于优盘的机密体系。-U disk-based authentication- procedures with the advance of technology, IT technology for the development of fly Mengjin. USB into the hands of ordinary computer users, has gradually replaced the calculation of the location of the floppy. USB now more manufacturers, the price relatively low, stable high, larger capacity, more and more features. The hands of computer users to use USB devices as encryption vector is the most suitable choice. Because software vendors do not require any investment, need not worry about the core technology. Most software vendors is to develop a confidential system based on USB.
Platform: | Size: 105472 | Author: caner199 | Hits:

[Crack Hackwenjianjiamideguolvqudongchengxudaima

Description: 文件加密的过滤驱动程序,适用于大部分的文件加密软件-File Encryption filter driver, applies to most of the file encryption software
Platform: | Size: 374784 | Author: 和强 | Hits:

[File OperateTCExplorer_src

Description: TrueCrypt is a free open-source disk encryption software. It is able to create a virtual encrypted disk within a file and mounts it as a real disk. The encryption is automatic, real-time (on-the-fly) and transparent. However, a major disadvantage of TrueCrypt and all other on-the-fly encryption software is the requirement of administrative privileges on the computers where they are used. Thus they will not be usable in places such as public libraries and internet cafes, where the computers are typically locked down and the users are given only limited privileges.-TrueCrypt is a free open-source disk encryption software. It is able to create a virtual encrypted disk within a file and mounts it as a real disk. The encryption is automatic, real-time (on-the-fly) and transparent. However , a major disadvantage of TrueCrypt and all other on-the-fly encryption software is the requirement of administrative privileges on the computers where they are used. Thus they will not be usable in places such as public libraries and internet cafes, where the computers are typically locked down and the users are given only limited privileges.
Platform: | Size: 746496 | Author: dhsong | Hits:

[Linux-UnixTrueCrypt-6.0a-Source.tar

Description: Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/-Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and LinuxMain Features:* Creates a virtual encrypted disk within a file and mounts it as a real disk.* Encrypts an entire partition or storage device such as USB flash drive or hard drive.* Encrypts a partition or drive where Windows is installed (pre-boot authentication).* Encryption is automatic, real-time (on-the-fly) and transparent.* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the: http://www.truecrypt.org/
Platform: | Size: 1686528 | Author: yangmuxiang | Hits:

[VC/MFCdoc1

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 198656 | Author: vara | Hits:

[Crack Hackdoc2

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 200704 | Author: vara | Hits:

[Driver Developusbdiskencrar

Description: 主要是U 盘加密的。可以对U盘 进行加密,是一个难得的例子-Files Description: DD\EDDrv.c: The on-the-fly encryption/decryption filter driver. DD\EdDrv.h: Main header file for the above. DD\IoctlCmd.h: Containing the IOCTLs for the driver. DD\EdDrv.lib: The library file containing the core of FastIO and Memory mapped file IO handling DD\EDDrvLib: Header file for the above library. DD\Makefile: Makefile for the driver. DD\Sources: Sources file for the driver. The current build has been done using Windows XP DDK checked build environment. Also since the domain name--against which the retrieved domain name is to be matched--is currently hard coded. Hence the hard coded name has to be change before compiling the user mode program The .lib file which has been provided in \DD\DD folder is checked built using Win XP DDK as of now.
Platform: | Size: 6766592 | Author: kennethroger | Hits:

[Driver Developencryption_on-the-fly

Description: 基于minifilter开发的文件透明加解密源码-It is a encryption program based minifilter struct.
Platform: | Size: 59392 | Author: maomx | Hits:

[Crack Hackaes-xts-vs2008-17-07-09

Description: On-the-fly encryption means that data is automatically encrypted or decrypted right before is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Platform: | Size: 944128 | Author: Santhosh R | Hits:

[Crack HackxTyAESCrypter

Description: TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Platform: | Size: 60416 | Author: Santhosh R | Hits:

[Linux-UnixSuggestion-based-Linux-file-search.tar

Description: TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). */
Platform: | Size: 1198080 | Author: Santhosh R | Hits:

[androidDreamerView

Description: 自带加密功能的图片浏览器源码打开应用以后会要求输入密码,默认密码admin。同时应用会自动扫描手机内部存储、SD卡存储上面的所有图片文件,并且根据文件夹进行分类列表显示,可以一键更换项目的背景图片。可以直接点击图片设置为壁纸或者添加到最喜爱的图片库,可以用幻灯片的方式全屏带有旋转、飞入等多种动画效果播放图片。支持横竖屏切换,可以详细的查看图片的信息。并且可以多种角度旋转图片文件。是学习和研究安卓相册图片方面不错的学习源码。-Image browser source code comes with encryption function to open the application will be required to enter the password, the default password admin. At the same time, the application will automatically scan the phone s internal storage, SD card store all of the image files, and according to the folder classification list display, you can replace the background image of a key project. You can click on the picture is set to wallpaper or add to the favorite picture library, you can use a slide way full screen with a rotation, fly into a variety of animation effects, etc.. Support screen switching, can view the pictures detailed information. And can rotate the image file in a variety of ways. Is to learn and study Android photo albums, good learning source.
Platform: | Size: 3034112 | Author: 郭莉琳 | Hits:

CodeBus www.codebus.net