Welcome![Sign In][Sign Up]
Location:
Search - hashes

Search list

[OS DevelopPwDump4

Description: This program dump password hashes from local or remote Windows NT/2000 machines. It prints them onto the screen in l0phtcrack format, or will write them to a file if desired. -This program dump password hashes from loc al Windows NT/2000 or remote machines. print It s them onto the screen in l0phtcrack format, or will write them to a file if desired.
Platform: | Size: 252055 | Author: 林杰 | Hits:

[Crack HackHASHES.ZIP

Description: 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。 -hash (Hashing) search and search for a general law (searching) is not the same. The hash law, the pair (key value) or identification characters (identifier) in the memory address of the sender is by function (function) generated from the conversion. Such functions, commonly known as hash functions (Hashing function) keys corresponding addresses or conversion (key to address transformation). For the limited storage space, which can be effectively used in acceding to or deleted can be completed faster, using hash method is the most appropriate. Because hash table search in the absence of collisions (collision) and overflow (overflow) circumstances, as long as one can capture that.
Platform: | Size: 24590 | Author: HCJ | Hits:

[WEB CodeL0phtCrack2.5

Description: L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。-L0phtCrack NT platform in the use of password auditing tool. It through the preservation of the NT operating system cryptographic hashes of links to crack users Password.
Platform: | Size: 4781 | Author: 立井伯 | Hits:

[Other resourceSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1406512 | Author: 周爽 | Hits:

[Develop Toolscookbook

Description: By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: Hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon-By Tom Christiansen and Nathan Torkington First Edition ISBN 1-56592-243-3. published Aug, 1998. (See the catalog page az r this book.) Search the text of Perl Cookbook. T Copyright able of Contents Page Foreword Prefa ce Chapter 1 : Strings Chapter 2 : Numbers Chapter 3 : Dates and Times Chapter 4 : Arrays Chapter 5 : Hashes Chapter 6 : Pattern Matching Chapter 7 : File Access Chapter 8 : File Contents Chapter 9 : Directories Chapter 10 : Subroutines Chapter 11 : References and Records Chapter 12 : Packages, Libraries, and Modules Chapter 13 : Classes, Objects, and Ties Chapter 14 : Database Access Chapter 15 : User Interfaces Chapter 16 : Process Management and Communication Chapter 17 : Sockets Chapter 18 : Internet Services Chapter 19 : CGI Programming Chapter 20 : Web Automation Index
Platform: | Size: 1787751 | Author: David Yin | Hits:

[Other resourceperlnut

Description: by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon -by Randal L. Schwartz and Tom Phoenix ISBN 0 -596-00132-0 Third Edition, published July 2001. (See the catalog page for t his book.) the text of Learning Perl, 3rd Edition. Table of Contents Page Copyright P reface Chapter 1 : Introduction Chapter 2 : Scalar Data Chapter 3 : Lists and Arrays Chapter 4 : Subroutines Chapter 5 : Hashes Chapter 6 : I / O Basics Chapter 7 : Concepts of Regular Expressions Chapter 8 : More About Regular Expressions Chapter 9 : Using Regular Expressions Chapter 10 : More Control Structures Chapter 11 : Filehandles and File Tests Chapter 12 : Directory Operations Chapter 13 : Manipulating Files and Directories Chapter 14 : Process Management Chapter 15 : Strings and Sorting Chapter 16 : Simple Databases Chapter 17 : Some Advanced Perl Techniques Appendix A : Exer
Platform: | Size: 1576611 | Author: David Yin | Hits:

[Other resourcelperl

Description: by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon -by Randal L. Schwartz and Tom Phoenix ISBN 0 -596-00132-0 Third Edition, published July 2001. (See the catalog page for t his book.) Learning Perl, 3rd Edition. Table of Contents Page Copyright P reface Chapter 1 : Introduction Chapter 2 : Scalar Data Chapter 3 : Lists and Arrays Chapter 4 : Subroutines Chapter 5 : Hashes Chapter 6 : I / O Basics Chapter 7 : Concepts of Regular Expressions Chapter 8 : More About Regular Expressions Chapter 9 : Using Regular Expressions Chapter 10 : More Control Structures Chapter 11 : Filehandles and File Tests Chapter 12 : Directory Operations Chapter 13 : Manipulating Files and Directories Chapter 14 : Process Management Chapter 15 : Strings and Sorting Chapter 16 : Simple Databases Chapter 17 : Some Advanced Perl Techniques Appendix A : Exercise Answers
Platform: | Size: 1021732 | Author: David Yin | Hits:

[Othersanliebiao

Description: 散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-hashtable known as hash table, it is through the hash function to determine the location of data elements stored in a special table structure. Program of the DOE document, the text word search, may have hashes
Platform: | Size: 12894 | Author: dfa | Hits:

[OS DevelopPwDump4

Description: This program dump password hashes from local or remote Windows NT/2000 machines. It prints them onto the screen in l0phtcrack format, or will write them to a file if desired. -This program dump password hashes from loc al Windows NT/2000 or remote machines. print It s them onto the screen in l0phtcrack format, or will write them to a file if desired.
Platform: | Size: 1294336 | Author: 林杰 | Hits:

[Crack HackHASHES.ZIP

Description: 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。 -hash (Hashing) search and search for a general law (searching) is not the same. The hash law, the pair (key value) or identification characters (identifier) in the memory address of the sender is by function (function) generated from the conversion. Such functions, commonly known as hash functions (Hashing function) keys corresponding addresses or conversion (key to address transformation). For the limited storage space, which can be effectively used in acceding to or deleted can be completed faster, using hash method is the most appropriate. Because hash table search in the absence of collisions (collision) and overflow (overflow) circumstances, as long as one can capture that.
Platform: | Size: 24576 | Author: HCJ | Hits:

[DocumentsL0phtCrack2.5

Description: L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。-L0phtCrack NT platform in the use of password auditing tool. It through the preservation of the NT operating system cryptographic hashes of links to crack users Password.
Platform: | Size: 4096 | Author: 立井伯 | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Bookscookbook

Description: By Tom Christiansen and Nathan Torkington ISBN 1-56592-243-3 First Edition, published August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Table of Contents Copyright Page Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: Hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation Index Colophon-By Tom Christiansen and Nathan Torkington First Edition ISBN 1-56592-243-3. published Aug, 1998. (See the catalog page az r this book.) Search the text of Perl Cookbook. T Copyright able of Contents Page Foreword Prefa ce Chapter 1 : Strings Chapter 2 : Numbers Chapter 3 : Dates and Times Chapter 4 : Arrays Chapter 5 : Hashes Chapter 6 : Pattern Matching Chapter 7 : File Access Chapter 8 : File Contents Chapter 9 : Directories Chapter 10 : Subroutines Chapter 11 : References and Records Chapter 12 : Packages, Libraries, and Modules Chapter 13 : Classes, Objects, and Ties Chapter 14 : Database Access Chapter 15 : User Interfaces Chapter 16 : Process Management and Communication Chapter 17 : Sockets Chapter 18 : Internet Services Chapter 19 : CGI Programming Chapter 20 : Web Automation Index
Platform: | Size: 1787904 | Author: David Yin | Hits:

[Otherperlnut

Description: by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon -by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for t his book.) the text of Learning Perl, 3rd Edition. Table of Contents Page Copyright P reface Chapter 1 : Introduction Chapter 2 : Scalar Data Chapter 3 : Lists and Arrays Chapter 4 : Subroutines Chapter 5 : Hashes Chapter 6 : I/O Basics Chapter 7 : Concepts of Regular Expressions Chapter 8 : More About Regular Expressions Chapter 9 : Using Regular Expressions Chapter 10 : More Control Structures Chapter 11 : Filehandles and File Tests Chapter 12 : Directory Operations Chapter 13 : Manipulating Files and Directories Chapter 14 : Process Management Chapter 15 : Strings and Sorting Chapter 16 : Simple Databases Chapter 17 : Some Advanced Perl Techniques Appendix A : Exer
Platform: | Size: 1575936 | Author: David Yin | Hits:

[Otherlperl

Description: by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon -by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for t his book.) Learning Perl, 3rd Edition. Table of Contents Page Copyright P reface Chapter 1 : Introduction Chapter 2 : Scalar Data Chapter 3 : Lists and Arrays Chapter 4 : Subroutines Chapter 5 : Hashes Chapter 6 : I/O Basics Chapter 7 : Concepts of Regular Expressions Chapter 8 : More About Regular Expressions Chapter 9 : Using Regular Expressions Chapter 10 : More Control Structures Chapter 11 : Filehandles and File Tests Chapter 12 : Directory Operations Chapter 13 : Manipulating Files and Directories Chapter 14 : Process Management Chapter 15 : Strings and Sorting Chapter 16 : Simple Databases Chapter 17 : Some Advanced Perl Techniques Appendix A : Exercise Answers
Platform: | Size: 1021952 | Author: David Yin | Hits:

[Othersanliebiao

Description: 散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-hashtable known as hash table, it is through the hash function to determine the location of data elements stored in a special table structure. Program of the DOE document, the text word search, may have hashes
Platform: | Size: 12288 | Author: dfa | Hits:

[Delphi/CppBuilderaaa

Description: 这是一个DELPHI7应用案例开发篇有配套程序种子光盘,有兴趣的朋友可以研究一下-This is a case Delphi7 application development articles have matching procedures seed discs, have interested friends can look
Platform: | Size: 5488640 | Author: 胡军 | Hits:

[AlgorithmpHash-0.4.tar

Description: pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
Platform: | Size: 293888 | Author: ssomsak | Hits:

[Linux-UnixPGP.Corporation.PGP.SDK.v3.7.2.ccrun.044998

Description: PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。 PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台: · Windows 98, Millennium (ME), NT, 2000, and XP · Mac OS X · Linux x86 with 2.0.x kernel or later · Sun Solaris SPARC 2.5.1, 2.6, 2.7, or 2.8 -PGP SDK支持下列算法: · Ciphers o IDEA o TripleDES o CAST5 o AES (128-, 182-, 256-bit密钥长度) o Twofish (256-bit 密钥长度) · Hashes o MD5 o SHA-1 o RIPEMD160 o SHA-2 (256-, 384-, 512-bit 密钥长度) · Public Key Algorithms o RSA o Diffie-Hellman o DSA
Platform: | Size: 14045184 | Author: guangmingniu | Hits:

[JSP/Javajacksum-1.7.0-windows-explorer-integration-1.1.0.z

Description: jacksun是checksum的独立工具平台,完全用java编写,用于计算和校验checksum-Jacksum is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
Platform: | Size: 221184 | Author: 谢永胜 | Hits:
« 12 3 4 »

CodeBus www.codebus.net