Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1230

« 1 2 ... .25 .26 .27 .28 .29 1230.31 .32 .33 .34 .35 ... 1665 »

[Crack HackDES_MD5

Description: C wrote two security MD5 and the DES algorithm is limited enlighten everyone
Platform: | Size: 131072 | Author: 徐欣民 | Hits:

[Crack Hackkeyring-2.0-pre6.tar

Description: keyring is a PALM China for the protection of critical information systems, protection of data including user name, password, credit card number, etc.
Platform: | Size: 241664 | Author: 姓名 | Hits:

[Crack Hackcryptmount-1.1.1.tar

Description: Cryptmount of the Linux system and the file system of user equipment. Documents and other encryption systems.
Platform: | Size: 202752 | Author: 姓名 | Hits:

[Crack HackKeePassX-0.2.2.tar

Description: KeePassX password protection for the safety of the use of high-strength encryption database
Platform: | Size: 303104 | Author: 姓名 | Hits:

[Crack HackCDes_standard

Description: the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of
Platform: | Size: 185344 | Author: 李文 | Hits:

[Crack Hackpassdic

Description: As many dictionaries generated passwords difficult to meet our requirements. If you forget the password of a part but recall if the use of conventional dictionary passwords generated password will be very huge, Blasting
Platform: | Size: 202752 | Author: gsj0791 | Hits:

[Crack Hackyymmxue

Description: cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literatu
Platform: | Size: 334848 | Author: 李志坚 | Hits:

[Crack HackDESencrypt

Description: This achieved with c a DES encryption algorithm. Should be suitable for those interested in encryption right people.
Platform: | Size: 254976 | Author: 黄树林 | Hits:

[Crack Hackduobiaotidai

Description: a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables ge
Platform: | Size: 1024 | Author: houny | Hits:

[Crack Hack032223

Description: Let f (x) = 1 x x2 x5 x27, respectively try to write the following Shift Register : f (x) connected to the DSR polynomial; f (x) for connectivity polynomial LFSR. Connection options polynomial : f (x) = 1 x x4 x6 x30; F2
Platform: | Size: 1024 | Author: houny | Hits:

[Crack Hacks-zhihuan

Description: from a random file read 256 byte data area DArea form data, re-shuffling in law application to the formation of 0 ~ 255 DTab a full array. Try to write were "seeking DArea by which all data (1) DTab S-boxes; (2) DTab rep
Platform: | Size: 3072 | Author: houny | Hits:

[Crack Hackmoni-momi

Description: two of 16 power-positive integer d and n, calculate the preparation of d-1 (mod n); 2. For not more than 2 3 16 Powers positive integers a, e and n, calculate the preparation ae (mod n) procedures. In the above procedure
Platform: | Size: 2048 | Author: houny | Hits:
« 1 2 ... .25 .26 .27 .28 .29 1230.31 .32 .33 .34 .35 ... 1665 »

CodeBus www.codebus.net