Welcome![Sign In][Sign Up]
Location:
SourceCode OS program

OS program List Page 15439

« 1 2 ... .34 .35 .36 .37 .38 15439.40 .41 .42 .43 .44 ... 16281 »

[OS programsource-1

Description: Telephone voice card programming, many people kept confidential things, and now everyone is free to use.
Platform: | Size: 52798 | Author: zhumao | Hits:

[OS programClipboardMonitor

Description: Very good version of windows clip viewer, source code is the.
Platform: | Size: 12626 | Author: zhumao | Hits:

[Linux-Unixcaozuoxitong

Description: Before the operating system to do the curriculum design, contents include: 1) the preparation of a C program, use the graphics library under Linux, sub-window display of three concurrent processes running 2) The modular
Platform: | Size: 389599 | Author: 熊德馨 | Hits:

[Crack HackXOR256_Stream_Encryption

Description: The encryption method used XOR256 hexadecimal text of the document or file encryption.
Platform: | Size: 183600 | Author: liuwei | Hits:

[Crack Hackmmpj_srcl

Description: A very useful source of password cracking. The examples of code using c language, to the preparation of the procedures have password cracking has some help.
Platform: | Size: 45612 | Author: liuwei | Hits:

[OS programScrollWord

Description: PowerWord own mini-back words, do not automatically read aloud, we must manually click on in order to read, too much trouble to bring back the original mini-word name into ScrollWord_old.exe, put this tool to copy the di
Platform: | Size: 17233 | Author: 唐成 | Hits:

[CA authHash

Description: Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion
Platform: | Size: 11683 | Author: 張建良 | Hits:

[OS programresource

Description: A use VB realize the windows resource management functions of the software, can build on in its development
Platform: | Size: 27628 | Author: 胡天 | Hits:

[Exploitmumashengchengqi

Description: A simple procedure for Trojan Generator, using VC development. Including some basic functions
Platform: | Size: 1220690 | Author: atl | Hits:

[CA authRSAalgorithm

Description: The use of large prime numbers multiplied difficult decomposition principle, the realization of RSA encryption algorithm, used in digital signatures.
Platform: | Size: 11166 | Author: 邓小欧 | Hits:

[CA authQQ123

Description: QQ attack a program source program source code to attack a QQ
Platform: | Size: 542544 | Author: 123 | Hits:

[Linux-UnixJudy

Description: A hash algorithm is similar to, but can be a member of the order of traversal, mapping a space-saving algorithm, including documentation and source code
Platform: | Size: 1125517 | Author: wuyang | Hits:
« 1 2 ... .34 .35 .36 .37 .38 15439.40 .41 .42 .43 .44 ... 16281 »

CodeBus www.codebus.net