Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1101

« 1 2 ... .96 .97 .98 .99 .00 1101.02 .03 .04 .05 .06 ... 1665 »

[Crack Hack7bakema

Description: system software to achieve the 7 Barker Code encoding decoding process!
Platform: | Size: 1024 | Author: Amy | Hits:

[Crack HackDES

Description: DES encryption system C source code C language implementation Welcome to download
Platform: | Size: 4096 | Author: | Hits:

[Crack HackLingangTools

Description: In the design process, requiring constant calculation of a string of hash value, encrypted text, to generate encrypted configuration file or EXCEL documents are converted into SQL database, etc., used to customize accord
Platform: | Size: 120832 | Author: lingang | Hits:

[Crack Hackclassiccode

Description: Caesar system, Vigenere system with C++ Realize encryption, decryption
Platform: | Size: 2048 | Author: 周丁珊 | Hits:

[Crack HackMD5

Description: MD5 example of a procedure, described in detail the work of MD5 encryption algorithm flow, suitable for beginners to read.
Platform: | Size: 5120 | Author: chengguangwei | Hits:

[Crack HackMD5

Description: Absolute so the Hash digest algorithm, providing the main function call routines, so good Oh, vc6.0 version!
Platform: | Size: 3072 | Author: zzylsn | Hits:

[Crack Hackcode

Description: File encryption and decryption, using the database program. This document itself will not be a peep.
Platform: | Size: 20480 | Author: 何镇安 | Hits:

[Crack Hackget

Description: The program can be realized on a text file encryption, using VC++ Programming
Platform: | Size: 3500032 | Author: shixuemei | Hits:

[Crack Hackkaiser

Description: Kaiser (kaiser) password decryption, that is, to identify its encryption key, thereby decrypt, because it is a symmetric cryptosystem, encryption and decryption key is the same, beneath a simple encryption to explain the
Platform: | Size: 1024 | Author: stop | Hits:

[Crack Hack1

Description: Smart card application is not simple to read and write card operations, but a comprehensive engineering projects. It includes not only read and write cards and modules to choose, but also to read and write control module
Platform: | Size: 372736 | Author: yudakui | Hits:

[Crack Hackcrc-32

Description: The use of look-up table method to complete the CRC-32 checksum, the following is the CRC-32 checksum of the subroutine it.
Platform: | Size: 4096 | Author: crc | Hits:

[Crack Hack4.1-20032238-VC

Description: Realize the file encryption and decryption algorithms, file formats realize the encryption and decryption
Platform: | Size: 2857984 | Author: 将闪闪 | Hits:
« 1 2 ... .96 .97 .98 .99 .00 1101.02 .03 .04 .05 .06 ... 1665 »

CodeBus www.codebus.net