Welcome![Sign In][Sign Up]
Location:
Search - file security

Search list

[File Operate文件加密源代码

Description: 对文件加密的代码,对初学文件保密的有一定的帮助 此乃MFC编程- To the document encryption code, to begins studies the file security to have certain help this is MFC programs
Platform: | Size: 143546 | Author: yang | Hits:

[CA authsecurity

Description: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for
Platform: | Size: 213582 | Author: 雷敏 | Hits:

[JSP/Javajsp File Browser

Description: ------------------------IMPORTANT With this jsp you can destroy important files on your system, it also could be a serious security hole on your server. Use this script only, if you know what you do. There is no warranty of any kind.
Platform: | Size: 25833 | Author: njauflash@163.com | Hits:

[Internet-Network入侵检测技术

Description: 入侵检测技术ppt教案- Teaching plan of Intrusion Detection Technology.File type ppt
Platform: | Size: 184320 | Author: 李函章 | Hits:

[Graph program图象载码程序源代码

Description: 这是我想到的一个非常有用的小程序,顾名思义,这个程序就是把不同的信号(如不同的文件:文本,图片,语音,乃至视频...)储存入电脑的图片文件.BMP文件中,以达到节省空间,安全加密,数据保护,多媒体同时运行,提高空间与时间的并行性。 -I think this is a very useful small program, as the name suggests, the procedure is different signals (such as different files : text, images, voice and even video ...) storage computer image files. BMP file, to save space, security encryption, data protection, while multimedia and increase the space and time of parallelism.
Platform: | Size: 3872768 | Author: 盒香烟 | Hits:

[File Operate文件加密源代码

Description: 对文件加密的代码,对初学文件保密的有一定的帮助 此乃MFC编程- To the document encryption code, to begins studies the file security to have certain help this is MFC programs
Platform: | Size: 143360 | Author: yang | Hits:

[OS programEraser

Description: 磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does not really delete the file will simply remove the fat table of contents, document data on the disk is, can be restored, therefore unsafe.
Platform: | Size: 933888 | Author: 陈爱国 | Hits:

[CA authsecurity

Description: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for
Platform: | Size: 212992 | Author: 雷敏 | Hits:

[ScannerAttackToolKitv4.0

Description: 这是一款基于Microsoft Windows 框架使用的开源安全扫描工具,可以用来检测系统安全漏洞和增强安全审计,可以生成详细的html、text和Nessus nsr 结果和攻击分析报告,支持CVE names、SecurityFocus、CERT、Snort、Nessus NASL等。内附源代码。-It is a Microsoft Windows-based framework for the use of open-source security scanning tools, Detection systems can be used for security vulnerabilities and strengthen security audit and can generate detailed html, text and Nessus NSR results and attack analysis, support CVE names, SecurityFocus, CERT, Snort, such as Nessus NASL. Enclosing the source code.
Platform: | Size: 2186240 | Author: googolplex | Hits:

[OS programlessonprocess

Description: 命名管道充分利用了Windows NT和Windows 2000内建的安全机制。 将命名管道作为一种网络编程方案时,它实际上建立了一个客户机/服务器通信体系,并在其中可靠地传输数据。 命名管道是围绕Windows文件系统设计的一种机制,采用“命名管道文件系统(Named Pipe File System,NPFS)”接口,因此,客户机和服务器可利用标准的Win32文件系统函数(例如:ReadFile和WriteFile)来进行数据的收发。 -named pipe full advantage of the Windows NT and Windows 2000 built-in security system system. To be named as a pipeline network programming package, which is actually the establishment of a client/server communication system, and in which reliable data transmission. A named pipe is on the Windows file system design of a mechanism, "Named Pipe File System (Named Pipe File System, NPFS) "interface, therefore, client and server can use standard Win32 file system functions (such as : ReadFile and WriteFile) data to the transceiver.
Platform: | Size: 245760 | Author: 李思川 | Hits:

[WEB Codeqyjtwzwmfxb

Description: 网站主要功能如下: 一、系统管理:管理员管理,可以新增管理员及修改管理员密码;数据库备份,为保证您的数据安全本系统采用了数据库备份功能;上传文件管理,管理你增加产品时上传的图片及其他文件。 二、企业信息:可设置修改企业的各类信息及介绍。 三、产品管理:产品类别新增修改管理,产品添加修改以及产品的审核。 四、订单管理:查看订单的详细信息及订单处理。 五、会员管理:查看修改删除会员资料,及锁定解锁功能。可在线给会员发信! 六、新闻管理:发布修改企业新闻和业内资讯。 七、留言管理:管理信息反馈及注册会员的留言,注册会员的留言可在线回复,未注册会员可使用在线发信功能给于答复。 八、工程展示:展示国内外工程项目 九、人才管理:发布修改招聘信息,人才策略栏目管理,应聘管理。 十、营销网络:修改营销网络栏目的信息。 十一、调查管理:发布修改新调查。 十二、邮件列表:管理邮件列表,在线发送邮件列表。 十三、友情链接:新增修改友情链接。 十四、资料下载:软件下载、文件合同下载等 所有东西傻瓜式修改与管理,拥有数据库防盗功能  后台管理登陆:/manage 管理员:admin 密码:admin -website main functions are as follows : a, system management : Administrators management, and the new manager can change administrator passwords; database backup, To ensure that your data security of the system using a database backup function; Upload file management, increase your management products upload pictures and other documents. Second, corporate information : changes may set up enterprises of all types of information and displays. 3, product management : new product category management changes, product changes and the addition of products audited. 4, Order Management : View orders for more information and order processing. 5, Member Management : Member View amended to delete information and unlocking lock function. Can be sent to the Member Online! 6, news management : Published
Platform: | Size: 3211264 | Author: gdfgdfgdf | Hits:

[Internet-NetworkMyProjects_cs

Description: 自定义协议,摸拟FTP文件传输,并对传输数据进行加密,保证数据传输安全,实现初步代码,基本的一些功能,未经详细测试,欢迎有兴趣的朋友来邮:streamby@163.com-Custom protocols, simulation FTP file transfer, and data encryption to ensure data transmission security, the realization of the initial code, the basic features, without any detailed testing, Interested parties are welcome to post: streamby@163.com
Platform: | Size: 272384 | Author: str_by | Hits:

[OS programFileDemo

Description: 本示例为 Windows 资源管理器提供了一个托管副本。 注意 托管资源管理器应用程序可像 Windows 资源管理器一样对计算机上的文件和目录的设置进行有效的更改。在进行这样的更改时应该小心。 此示例允许您设置环境变量、查看和修改驱动器详细信息、读写文本文件以及查看或修改目录或文件的安全设置。 -This example for the Windows Explorer to provide a copy of a trusteeship. Note hosting application resource manager can be like the Windows Explorer on the computer on the same files and directories setting effective changes. In such a change should be careful when. This example allows you to set environment variables, view and edit detailed information drives, read and write text files and view or modify the directory or file security settings.
Platform: | Size: 101376 | Author: 王子 | Hits:

[Other25175xshy0912

Description: 25175 学生会员注册系统 2007 Build 0912 /Registration.ASP 学生注册系统主文件 报名内容{用户名,密码,确认密码,EMail,QQ号码 ,真实姓名 ,性别,年龄,家庭住址,电话,手机,身份证号码,密码提示问题,安全回答} /user_login.asp 通过注册的帐号:密码:验证码:进行登陆学生 /conn.asp 将此段改成你要的路径DataPath="/20070911baoming20/data/#123.mdb" /admin/login.asp 后台admin admin进行登陆管理,密码是加MD5加密 md5双重加密,防SQL注入,分页技术,用户群删, /admin_index.asp 服务器基本信息显示 /logout.asp 后台退出-25,175 student members Registration System 2007 Build 0912/Registration.ASP Student Registration System master file application content (user name, password, Confirm Password, EMail, QQ number, real name, gender, age, home address, telephone, mobile phone, identity card number , password, question, security answer)/user_login.asp through the Register Username: Password: Verification Code: for landing students/conn.asp the paragraph you want to change the path of DataPath =
Platform: | Size: 246784 | Author: sunpeidong | Hits:

[Disk ToolsEraser584Src

Description: 版本更新了一下,到5.84了,需要用VS.net平台进行编译运行,介绍与原来的一样! 磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does not really delete the file will simply remove the fat table of contents, document data on the disk is, can be restored, therefore unsafe.-Version update, then to 5.84, and need to use VS.net compiler platform running on the same as the original! Delete disk document security, we usually performed by the delete operation is not really delete files just cleared table fat content, file data is still on disk, can be resumed, so unsafe.-disk deletion of the security document, we usually enforced by the delete operation does not really delete the file will simply remove the fat table of contents, document data on the disk is, can be restored, therefore unsafe.
Platform: | Size: 2653184 | Author: 梁军学 | Hits:

[OS programPE_EXEVIEW_PEFILE

Description: The Portable Executable File Format from Top to Bottom原文、译文及源代码 1、The Portable Executable File Format from Top to Bottom 是最早讲解PE格式的文章之一,是了解PE格式入门很好的文章,原文可以在MSDN1998光盘找到中。 2、这篇文章被国内网友多次翻译,有代表性的译文有两个: 看雪软件安全论坛(bbs.pediy.com)中的ah007译为:可移植的可执行文件格式全接触 VCKBASE(www.vckbase.com)转载的李马的译文题目为:PE文件格式详解。 3、在VCKBASE中有网友要这篇文章提到的源代码,好不容易找到的,一并提供。 -The Portable Executable File Format from Top to Bottom the original text, translation and the source code 1, The Portable Executable File Format from Top to Bottom is one of the earliest articles on the PE format is one entry-a very good understanding of PE format the article, the original can MSDN1998 found in CD-ROM. 2, this article has been translated many times the domestic users, representative asked is twofold: to see software security forum snow (bbs.pediy.com) in the translated ah007: Portable Executable File Format Keys VCKBASE ( www.vckbase.com) reprint Li Ma asked titled: PE File Format explain. 3, in VCKBASE are friends to this article referred to the source code, hard to find, together with the provision.
Platform: | Size: 484352 | Author: lch | Hits:

[File OperateSeeFile

Description: 模拟简单的资源管理器 实现FAT32和NTFS文件格式下的文件安全删除 主要是直接读写逻辑硬盘-Simulation of a simple resource manager to achieve FAT32 and NTFS file format under the file security to delete the main hard drive is a direct read-write logic
Platform: | Size: 227328 | Author: xieming | Hits:

[Driver Developfilesystemdriver

Description: 文件系统过滤驱动开发代码,可用于文件加密,保护硬盘数据的安全。-File system filter driver development code, can be used for file encryption to protect the hard disk data security.
Platform: | Size: 147456 | Author: jcq | Hits:

[OS program201012114204669

Description: 卓然主动防御源码(可执行文件+完整源码+完整作品报告,卓然驱动级云安全主动防御系统 目录 开发目的 2 系统特性 4 一. 使用RootiKit技术,精确拦截木马,曝光恶意行为 4 二. 提供详细行为描述信息,帮助用户判断 4 三. 云安全概念融入,精确判断文件安全级别 4 四. 支持白名单、黑名单,引入云规则,减少提醒 4 五. 多模块相互配合,将木马及其衍生物一网打尽 4 -Zoran active defense source (executable+ source+ complete works full report, Zoran driver-level cloud security system directory was developed to active defense system features 4 a 2. Use RootiKit technology, precision intercept Trojans, 4 second exposure of malicious behavior. Provide detailed behavior description to help users determine the 4 III. the concept of security into the cloud, file security level to determine exactly 4 IV. supports whitelists, blacklists, rules for the introduction of the cloud, reducing to remind 4 five. multi-module complement each other, the Trojan and its derivatives Clean Sweep 4
Platform: | Size: 2699264 | Author: 李学兵 | Hits:

[Technology ManagementFile-security-protection-technology

Description: 随着信息技术的广泛应用,数字文明彻底改变了传统信息存储交流 形式,数字文件大量涌现,数字档案逐渐发展成为档案家族中重要的一 员。数字档案的广泛应用带来了一系列的便利和好处,但其安全维护及 合法使用问题也日益突出。在这一背景下,新兴的数字水印技术日益成 为解决数字档案信息安全的重要有效手段,它能有效地对数字媒体进行 版权保护及内容验证-With the extensive application of information technology, digital civilization completely changed the traditional forms of communication of information storage, large numbers of digital files, and gradually developed into a digital archive file of an important family. Extensive application of digital archives brought a series of convenience and benefits, but its maintenance and safety issues are also increasingly prominent legitimate use. In this context, the emerging digital watermarking technology is becoming increasingly digital archive of information security to solve an important and effective tool, it can effectively protect the copyright of digital media and content validation
Platform: | Size: 131072 | Author: 张一米 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 34 »

CodeBus www.codebus.net