Welcome![Sign In][Sign Up]
Location:
Search - software protection

Search list

[ExploitCracker终结者——提供最优秀的软件保护技术

Description: Cracker终结者——提供最优秀的软件保护技术-Cracker Terminator -- with the best software protection technology
Platform: | Size: 17104854 | Author: 李刚 | Hits:

[Compress-Decompress algrithms把信息写到自身的Exe文件中

Description: 把信息写到自身的Exe文件中,并能读取,可用它进行一些软件的加密和保护-may write information into the EXE file itself and also can read. It may be used in software protection and encription.
Platform: | Size: 11231 | Author: 杨宏刚 | Hits:

[Windows Develop[COM本质论].加密与解密-教材

Description: 加密与解密》(第二版)   汇集国内顶尖软件调试论坛(看雪论坛)众多密界一流好手,展示软件调试最核心!浓缩了这3年来国内加密与解密技术的发展,非常值得收藏!   本书全面揭示Windows平台的加密与解密技术!采用循序渐进方式,从基本的跟踪调试到深层的拆解脱壳,从浅显的注册码分析到加密算法及商用软件保护,这520页的一部书,几乎囊括了Windows软件保护的绝大多数内容。   看完这本书,解密不再神秘。不论是解密爱好者还是软件编程者都应该好好去看看。全国新华书店发行!   与之配套的《加密与解密---续集》也会在随后的几个月内推出!两本书内容互补、并不重复,组合阅读会令你的加解密水平有一个质的飞跃!!! -encryption and decryption "(second edition) pooled top domestic software debugging Forum (see Ice Forum) sector dense many top athletes display software debug core! Enrichment of the past three years domestic encryption and decryption technology, a very worthwhile collection! The book comprehensively revealed the Windows platform encryption and decryption technology! Adopting a gradual manner, from basic to the deep trace debug disassembling sabot, from simple analysis of the registry key encryption algorithm and business software protection, 520 of a book that seemed to include Windows software to protect the vast majority of content. Reading this book, declassified no longer mysterious. Both lovers or decryption software programming has to be good to look at. National distributed by
Platform: | Size: 2051319 | Author: 名民 | Hits:

[Other resource解密与加密技术教程

Description: 由本站与广大网友合作的新书《加密与解密--软件保护技术与解决方案》于近日上市,全国新华书店发行,需要者可于近期到本地各大书店咨询。   看完这本书,解密不再神秘。不论是解密爱好者还是软件编程者都应该好好去看看。-by netizens site with the cooperation of a new book entitled "Encryption and decryption -- software protection technologies and solutions" in the recent listing of the country and distributed by Xinhua Bookstore, will be needed in the near future to the local Advisory major bookstores. Reading this book, declassified no longer mysterious. Both lovers or decryption software programming has to be good to look at.
Platform: | Size: 4644287 | Author: 楼上楼 | Hits:

[Other resource软件加密原理与应用[配套光盘]

Description: 此为本书的配套光盘.本书不但由浅入深地讲解了软件保护技术,而且还精选并剖析了一些破解实例,并从一定的角度透视解密者的心态,在多处对照了软件保护与破解的思维方法。主要内容有:软件加密的发展历史、误区、方法,以及与特定语言相关的软件加密技术;破解技术剖析,以及常见的软件加密薄弱环节;PE技术、实战外壳加密与反脱壳技术(附大量示例源码),并提供了作者自己编写的小工具(加壳工具PEMaker等);调试技术与反调试技术(附大量示例源码);软件加密技巧与整体方案设计;加密锁分类及其使用技巧(智能卡加密锁)。-this be supporting the CD. The book not only elementary to explain the software protection technology, but also selected and analyzed some scary examples, and from a certain angle lens decryption of mentality in various control software protection and crack way of thinking. The main contents are : encryption software in the history of misunderstanding, methods, and with the specific language-related software encryption technology; Crack technical analysis, and common weak link encryption software; PE technology, real shell encryption technology and anti-sabot (A large sample source), and mention the author himself for the preparation of small tools (PEMaker shell tools, etc.); Debugging and anti-debugging techniques (A large sample source); software encryption techniques and overall progra
Platform: | Size: 12813373 | Author: 陶立欣 | Hits:

[Windows DevelopJMYJM

Description: 《加密与解密》配套代码 本书讲述Windows环境下的加密与解密技术。这本书采用循序渐进方式,从基本的跟踪调试到深层的拆解脱壳,从浅显的注册码分析到商用软件保护,这500多页的一部书,几乎囊括了Windows下的软件保护的绝大多数内容。 本书内容丰富,不论是加解密爱好者还是软件编程者都应该好好看看。自出版以来,得到海内外读者的高度赞誉,是致力于加密与解密研究的专业或非专业人员一本难得的好书。-"encryption and decryption of" complementary code book on the environment of Windows encryption and decryption technology. This book adopting a gradual approach, from basic to the deep trace debug the dismantling of shelling, The license from the simple analysis of the business software protection, which more than 500 pages of a book. Of all the Windows software to protect the vast majority of content. The book is rich in content, both encryption and decryption lovers or software programming has to be a good look. Since publication, readers at home and abroad to be highly praised it is committed to the encryption and decryption of the professional or research professionals a rare books.
Platform: | Size: 322647 | Author: 苏义岭 | Hits:

[OS programTestLock

Description: 实现软件保护,时间锁和文件锁. 实现软件保护,时间锁和文件锁.-software protection, time locks and lock documents. Software protection, time locks and lock documents.
Platform: | Size: 14473 | Author: 宏生电通 | Hits:

[Internet-NetworkCracker终结者——提供最优秀的软件保护技术

Description: Cracker终结者——提供最优秀的软件保护技术-Cracker Terminator-- with the best software protection technology
Platform: | Size: 17104896 | Author: 站长 | Hits:

[Compress-Decompress algrithms把信息写到自身的Exe文件中

Description: 把信息写到自身的Exe文件中,并能读取,可用它进行一些软件的加密和保护-may write information into the EXE file itself and also can read. It may be used in software protection and encription.
Platform: | Size: 11264 | Author: 杨宏刚 | Hits:

[Windows Develop[COM本质论].加密与解密-教材

Description: 加密与解密》(第二版)   汇集国内顶尖软件调试论坛(看雪论坛)众多密界一流好手,展示软件调试最核心!浓缩了这3年来国内加密与解密技术的发展,非常值得收藏!   本书全面揭示Windows平台的加密与解密技术!采用循序渐进方式,从基本的跟踪调试到深层的拆解脱壳,从浅显的注册码分析到加密算法及商用软件保护,这520页的一部书,几乎囊括了Windows软件保护的绝大多数内容。   看完这本书,解密不再神秘。不论是解密爱好者还是软件编程者都应该好好去看看。全国新华书店发行!   与之配套的《加密与解密---续集》也会在随后的几个月内推出!两本书内容互补、并不重复,组合阅读会令你的加解密水平有一个质的飞跃!!! -encryption and decryption "(second edition) pooled top domestic software debugging Forum (see Ice Forum) sector dense many top athletes display software debug core! Enrichment of the past three years domestic encryption and decryption technology, a very worthwhile collection! The book comprehensively revealed the Windows platform encryption and decryption technology! Adopting a gradual manner, from basic to the deep trace debug disassembling sabot, from simple analysis of the registry key encryption algorithm and business software protection, 520 of a book that seemed to include Windows software to protect the vast majority of content. Reading this book, declassified no longer mysterious. Both lovers or decryption software programming has to be good to look at. National distributed by
Platform: | Size: 2051072 | Author: 名民 | Hits:

[Othersoftwareprotect

Description: 浅谈软件保护,说实话我也不太明白,大家都来看看! -software protection, tell the truth I do not quite understand that we have to look at!
Platform: | Size: 4096 | Author: 张爱民` | Hits:

[Crack HackBCB

Description: 软件加密保护,硬加密方案。 USB加密锁示例代码。-Encryption software protection, hardware encryption scheme. USB encryption lock sample code.
Platform: | Size: 18432 | Author: awaker | Hits:

[Crack HackVS2005

Description: 软件加密保护,硬加密方案。 USB加密锁示例VS2005代码。-Encryption software protection, hardware encryption scheme. USB encryption lock code sample VS2005.
Platform: | Size: 39936 | Author: awaker | Hits:

[Crack HackDelphi

Description: 软件加密保护,硬加密方案。 USB加密锁示例Delphi代码。-Encryption software protection, hardware encryption scheme. USB encryption locks Delphi sample code.
Platform: | Size: 62464 | Author: awaker | Hits:

[Crack HackDECODE

Description: 加密与解密--软件保护技术及完全解决方案-Encryption and decryption- software protection technologies and complete solutions
Platform: | Size: 1956864 | Author: a fa | Hits:

[Crack HackAntiCopyFile

Description: 软件加密中的防拷贝技术,是学习软件保护的好东西!-Encryption software copy protection technology, is learning software to protect the good stuff!
Platform: | Size: 381952 | Author: 凌晨两点 | Hits:

[BooksSoftware-Protection

Description: 下一代软件保护技术方案,对软件开发者非常实用-The next generation software protection technical program, is practical to the software exploiter
Platform: | Size: 46080 | Author: 麻子 | Hits:

[Compress-Decompress algrithmsAm

Description: 对PE文件进行 加密输入表 加密Section 修改资源表 隐藏区块名字 是很强大的软件保护工具-Input of the PE file encryption encryption Section modify the resource table table hidden block name is a very powerful software protection tools
Platform: | Size: 4118528 | Author: 王明华 | Hits:

[Software Engineeringsoftware-protect

Description: 因为工作性质,收集了软件保护机制研究方面的资料-Because the nature of work, a collection of software protection mechanism in data
Platform: | Size: 680960 | Author: 704928782 | Hits:

[Software EngineeringJava-software-protection-technology

Description: 用加密的方法来保护Java类文件,加密可以有效地对抗反编译 Java技术在设计之初就考虑到应用环境的复杂性,因此允许用户根据Java规范定制类加载器,使用这些定制的Classloader可以完成特定的操 作,比如从网络上下载类文件,验证类文件来源等,本文定制了 北京邮电大学硕日毋究生学位论文Java软件保护技术研究及实现一个Classloader来完成加密类文件的加载" (3)负责密钥提取和解密的具体算法不能被加密,否则又需要先将它 们解密,由此将形成一个循环,而它们又是必须要加以保护的核 心内容,本方案中,将它们用C++实现并编译为本地的动态链接 库文件,这样可以有效地抵抗反编译 -Encryption method used to protect Java class files, encryption can be effective against decompile Java technology early in the design to take into account the complexity of the application environment, thus allowing users to customize the Java class loader specification, use these custom Classloader can be completed specific actions, such as class files downloaded from the Internet, verify that the class file sources, Beijing University of Posts and customized paper at no postgraduate Master Thesis Java software protection technology research and implement a Classloader to complete the encryption class file loaded " (3 ) is responsible for extracting and decrypting key specific algorithm can not be encrypted, or they need to first decrypt them, thereby forming a loop, and that they must be taken to protect the core, this scenario, they are implemented using C++ and compiled to native dynamic link library file, which can effectively resist decompile
Platform: | Size: 1024 | Author: 李忠楠 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 18 »

CodeBus www.codebus.net