Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .96 .97 .98 .99 .00 1101.02 .03 .04 .05 .06 ... 1665 »
Downloaded:0
DES encryption system C source code C language implementation Welcome to download
Update : 2025-01-23 Size : 4kb Publisher :

Downloaded:0
In the design process, requiring constant calculation of a string of hash value, encrypted text, to generate encrypted configuration file or EXCEL documents are converted into SQL database, etc., used to customize accord
Update : 2025-01-23 Size : 118kb Publisher : lingang

Downloaded:0
Caesar system, Vigenere system with C++ Realize encryption, decryption
Update : 2025-01-23 Size : 2kb Publisher : 周丁珊

Downloaded:0
MD5 example of a procedure, described in detail the work of MD5 encryption algorithm flow, suitable for beginners to read.
Update : 2025-01-23 Size : 5kb Publisher : chengguangwei

Downloaded:0
Absolute so the Hash digest algorithm, providing the main function call routines, so good Oh, vc6.0 version!
Update : 2025-01-23 Size : 3kb Publisher : zzylsn

Downloaded:0
File encryption and decryption, using the database program. This document itself will not be a peep.
Update : 2025-01-23 Size : 20kb Publisher : 何镇安

Downloaded:0
The program can be realized on a text file encryption, using VC++ Programming
Update : 2025-01-23 Size : 3.34mb Publisher : shixuemei

Downloaded:0
Kaiser (kaiser) password decryption, that is, to identify its encryption key, thereby decrypt, because it is a symmetric cryptosystem, encryption and decryption key is the same, beneath a simple encryption to explain the
Update : 2025-01-23 Size : 1kb Publisher : stop

Downloaded:1
Smart card application is not simple to read and write card operations, but a comprehensive engineering projects. It includes not only read and write cards and modules to choose, but also to read and write control module
Update : 2025-01-23 Size : 364kb Publisher : yudakui

Downloaded:0
The use of look-up table method to complete the CRC-32 checksum, the following is the CRC-32 checksum of the subroutine it.
Update : 2025-01-23 Size : 4kb Publisher : crc

Downloaded:0
Realize the file encryption and decryption algorithms, file formats realize the encryption and decryption
Update : 2025-01-23 Size : 2.73mb Publisher : 将闪闪

Downloaded:0
AES encryption AES encryption Detailed Detailed
Update : 2025-01-23 Size : 18kb Publisher : kell
« 1 2 ... .96 .97 .98 .99 .00 1101.02 .03 .04 .05 .06 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.