Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .84 .85 .86 .87 .88 689.90 .91 .92 .93 .94 ... 1665 »
Downloaded:0
AES encryption implementation, code more, but the feature is full, meet all the needs of
Update : 2025-02-01 Size : 229kb Publisher : suchongmao

Downloaded:0
Student achievement management system
Update : 2025-02-01 Size : 7.66mb Publisher : why

Downloaded:0
The full version of elliptic curve encryption algorithm, with C++ implementation, including key generation, encryption and decryption of files, can complete run ~
Update : 2025-02-01 Size : 1.33mb Publisher : lixiang

Downloaded:0
The full version of AES encryption and decryption algorithm, switch the key 128,192,256. Smooth running, beautiful interface ~
Update : 2025-02-01 Size : 390kb Publisher : lixiang

Downloaded:0
the md5 program used for check some file is same or not
Update : 2025-02-01 Size : 78kb Publisher :

Downloaded:0
In visual studio 2005 environment, the development of a DES encryption and decryption process, using the C language, can be completed. Txt file encryption and decryption operations, does not support the pdf and other fil
Update : 2025-02-01 Size : 250kb Publisher : lw

Downloaded:0
DES encryption and decryption procedures, user interface, including the development of the MFC under VC6 procedures.
Update : 2025-02-01 Size : 281kb Publisher : lw

Downloaded:0
RC4 algorithm。 designed with C。first it run at VC6.0 .nOW it can run at VS08
Update : 2025-02-01 Size : 1kb Publisher : Peng

Downloaded:0
C#, graphical interface to the file encryption and decryption operations
Update : 2025-02-01 Size : 277kb Publisher :

This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters ve
Update : 2025-02-01 Size : 17kb Publisher : sinsin

A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categor
Update : 2025-02-01 Size : 81kb Publisher : sinsin

Downloaded:0
Chaotic system to achieve ultra video encryption method designed by discrete cosine transform
Update : 2025-02-01 Size : 561kb Publisher : 王丽丽
« 1 2 ... .84 .85 .86 .87 .88 689.90 .91 .92 .93 .94 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.