Welcome![Sign In][Sign Up]
Location:
SourceCode OS program

OS program List Page 15720

« 1 2 ... .15 .16 .17 .18 .19 15720.21 .22 .23 .24 .25 ... 16281 »

[Crack Hack3DES_Encryption

Description: 3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
Platform: | Size: 63105 | Author: liudongxiao | Hits:

[Crack HackCBC_DESEncryption

Description: use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Platform: | Size: 67447 | Author: liudongxiao | Hits:

[Linux-Unixunix_network_programming

Description: unix Network Programming, Vol 1 socket API and X/Open Transmission Network Interface API unix Liaison Program, volume 2, inter-process communication, including two volumes of the source code
Platform: | Size: 305183 | Author: 郭涛 | Hits:

[OS programWOL_RemoteMacFinder_prj

Description: source of foreign classics `` `I feel very good ``` little ``````````````
Platform: | Size: 33347 | Author: mo | Hits:

[OS programMSDEV_Cmd_Line

Description: how to use a command line compiler VC procedures established procedures in mind the example source code
Platform: | Size: 2557 | Author: stephen | Hits:

[ExploitAction-Policy

Description: XACML behavior strategy set
Platform: | Size: 4064 | Author: 明慧 | Hits:

[OS programnbtstat-vc6.0

Description: wrote of the network scanner. Based on UDP. Can check its own computer network segment where the situation
Platform: | Size: 42762 | Author: 张宇 | Hits:

[OS programNetTraffic-vc6.0

Description: written by VC 6.0 network traffic monitor. Analog Windows network monitoring. See their surveillance Now the computer network
Platform: | Size: 54944 | Author: 张宇 | Hits:

[Linux-Unixshowenv

Description: show all Linux executable environment variables, including the C source code, RedHat Linux use
Platform: | Size: 5279 | Author: 6756 | Hits:

[Crack Hackdoublerandomphaseencryptionofbiologytrait

Description: procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges.
Platform: | Size: 1592 | Author: 肖海 | Hits:

[Crack Hackimageattackandencryption

Description: this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
Platform: | Size: 1238 | Author: 肖海 | Hits:

[OS programC8_7_2

Description: C builder wrote on the broadcast of an example, download, and it is talked about
Platform: | Size: 4938 | Author: asfgwert | Hits:
« 1 2 ... .15 .16 .17 .18 .19 15720.21 .22 .23 .24 .25 ... 16281 »

CodeBus www.codebus.net