Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .19 .20 .21 .22 .23 1524.25 .26 .27 .28 .29 ... 1665 »
Downloaded:0
With large numbers MIRACL library to achieve the shared computing software security register.
Update : 2008-10-13 Size : 307.56kb Publisher : 丁莉娜

Downloaded:3
For Logistic mapping, a digital image iterative chaotic encryption algorithm is implemented
Update : 2008-10-13 Size : 170.82kb Publisher : 丁莉娜

Downloaded:0
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemen
Update : 2008-10-13 Size : 9.46kb Publisher : 刘博

Downloaded:0
Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
Update : 2008-10-13 Size : 262.63kb Publisher : 梅三

Downloaded:0
Blowfish encryption algorithm, use before loading a document Blowfish.java
Update : 2008-10-13 Size : 874byte Publisher : 李勃

Downloaded:0
Encryption, security, compression treatment, examples have lovers can learn
Update : 2008-10-13 Size : 67.78kb Publisher : 王朱忠

Downloaded:0
Database access interface encryption algorithm source code may need to be adjusted according to algorithm
Update : 2008-10-13 Size : 25.13kb Publisher : 雷天兆

err
Update : 2008-10-13 Size : 7.42mb Publisher : leejia

Downloaded:0
Principle: The Pe documents. Data section,. Text section to XOR encryption, and then will take declassified documents Loader write head and the first between the beginning of paragraph, modify Entry Point to point Loader
Update : 2008-10-13 Size : 447.66kb Publisher : 东南

Downloaded:0
Principle: The Pe documents. Data section,. Text section to XOR encryption, and then will take declassified documents Loader write head and the first between the beginning of paragraph, modify Entry Point to point Loader
Update : 2008-10-13 Size : 446.46kb Publisher : 东南

Downloaded:0
VHDL realize 128bitAES encryption algorithm LOW AREA realize cost-saving DATA FLOW for 8 bits
Update : 2008-10-13 Size : 19.57kb Publisher : ZHUOHUI LI

Downloaded:0
The English encryption device, which USES VB programming, simulated the German fan encryption device during world war ii, adopted new algorithm and high efficiency.
Update : 2008-10-13 Size : 8.82kb Publisher : 赵宸
« 1 2 ... .19 .20 .21 .22 .23 1524.25 .26 .27 .28 .29 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.