Description: Developed procedures to help encrypt and decrypt! Using MD5 algorithm, real-time database which has been stolen, nor can the user login password Platform: |
Size: 1797 |
Author:111111 |
Hits:
Description: The realization of block cipher encryption and decryption functions, although the article is not long, but the features and functions can also be Platform: |
Size: 2476 |
Author:liuyang |
Hits:
Description: Detection of memory Soft-Ice, was used in all memory search Soft-Ice s signature to achieve. Platform: |
Size: 815 |
Author:Jenifer |
Hits:
Description: Use of junk code to carry out the static encryption is very effective, which will decrypt one can not see all the instructions, put an end to the first printing process and then slowly down analysis approach. Platform: |
Size: 766 |
Author:Jenifer |
Hits: