Description: This procedure detailed presentation of the relevant coding process. The study of coding staff are very helpful Platform: |
Size: 175104 |
Author:张志风 |
Hits:
Description: Using these subroutines, we successfully developed a key keyboard with 89C52 as the core single chip Platform: |
Size: 48128 |
Author:孙朝华 |
Hits:
Description: Internet cafes are now the boss in order to computer security in general will be some options blocked, should not lead us to the use of certain features. For our Internet security, we must use the lifting of the blockade Platform: |
Size: 25600 |
Author:dan |
Hits:
Description: des and rsa algorithm for encryption and decryption program source code, algorithms can be understood how to achieve ideological Platform: |
Size: 82944 |
Author:孙良旭 |
Hits:
Description: An algorithm that USES the random number to encrypt a string, which is realized by VC, and is converted from VB source Platform: |
Size: 1024 |
Author:陈小明 |
Hits:
Description: VB write industrial software registration function code. Complex encryption software is used to combine the hard disk data algorithm Platform: |
Size: 9216 |
Author:利定任 |
Hits: