Description: 3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns. Platform: |
Size: 63105 |
Author:liudongxiao |
Hits:
Description: use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password. Platform: |
Size: 67447 |
Author:liudongxiao |
Hits:
Description: how to use a command line compiler VC procedures established procedures in mind the example source code Platform: |
Size: 2557 |
Author:stephen |
Hits:
Description: wrote of the network scanner. Based on UDP. Can check its own computer network segment where the situation Platform: |
Size: 42762 |
Author:张宇 |
Hits:
Description: written by VC 6.0 network traffic monitor. Analog Windows network monitoring. See their surveillance Now the computer network Platform: |
Size: 54944 |
Author:张宇 |
Hits:
Description: show all Linux executable environment variables, including the C source code, RedHat Linux use Platform: |
Size: 5279 |
Author:6756 |
Hits:
Description: procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges. Platform: |
Size: 1592 |
Author:肖海 |
Hits:
Description: this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do. Platform: |
Size: 1238 |
Author:肖海 |
Hits: