Welcome![Sign In][Sign Up]
Location:
SourceCode OS program

OS program List Page 15787

« 1 2 ... .82 .83 .84 .85 .86 15787.88 .89 .90 .91 .92 ... 16281 »

[Crack HackRandomCFSEncode

Description: use CFS coding to the randomly generated string instrument can be used as simple encryption tool
Platform: | Size: 1752 | Author: 王立坚 | Hits:

[OS programhzxtsrc

Description: Chinese system source code, is all that deserves careful to study the
Platform: | Size: 1853984 | Author: wangfei | Hits:

[Crack Hackencrypt-files

Description: have realized increases declassified document, procedures for Microsoft Visual Studio environment.NET 2003.
Platform: | Size: 10895 | Author: pcjim | Hits:

[Linux-UnixLinuxC_yuandaima

Description: linuxc Programming book chapters in every class all the source code needed downloading
Platform: | Size: 51820 | Author: wanghui | Hits:

[Linux-Unixos4FileSystems

Description: learn Linux document management procedures of how to organize knowledge, Then the paper to simplify system design and realization of a catalog operation group. Linux designed document management procedures for adaptation
Platform: | Size: 94601 | Author: wanghui | Hits:

[Linux-Unixos3Ajobschedulingsystem

Description: more than one process to achieve operational control of the system, users can complete the operation as follows, 1. Submitted their own operations, Scheduling allows the system operation; 2. has been submitted to the ope
Platform: | Size: 160276 | Author: wanghui | Hits:

[Linux-Unixos1-TheYalnixShell

Description: Develop clear, readable, well-documented and well-designed programs in the C Programming Language. Develop software in the Unix/Linux using tools such as gcc, gdb, and make. Locate and interpreting man pages applicable t
Platform: | Size: 42604 | Author: wanghui | Hits:

[Linux-Unixos2_VirtualMemory

Description: learning how Linux virtual memory. Architecture has nothing to do with the general storage model is all Linux virtual memory to achieve the foundation, However, the realization of any particular are dependent on specific
Platform: | Size: 1038036 | Author: wanghui | Hits:

[Crack Hackencrpt

Description: a simple encryption and decryption procedures. Debugging available. Principle is very simple, that is, encryption for digital characters, Digital Encryption case-by-case basis.
Platform: | Size: 2069 | Author: James | Hits:

[Crack HackAESEncrpt

Description: This is a complete set of AES encryption and decryption procedures, using VB, debugging available.
Platform: | Size: 32442 | Author: James | Hits:

[Crack HackMD5Encrpt

Description: This is a complete MD5 algorithm, using VB. Debugging available.
Platform: | Size: 4133 | Author: James | Hits:

[OS programwindows32

Description: this foreign books of source code, the Chinese name : WINDOWS32-programming, like it. The book is classic, as a learning-programming windows32 friends, of course, FOSS may be what you need.
Platform: | Size: 1191126 | Author: xu | Hits:
« 1 2 ... .82 .83 .84 .85 .86 15787.88 .89 .90 .91 .92 ... 16281 »

CodeBus www.codebus.net