Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .05 .06 .07 .08 .09 710.11 .12 .13 .14 .15 ... 1665 »
Downloaded:0
IPSEC VPN for data encryption
Update : 2025-02-01 Size : 6kb Publisher : 黄学汞

Downloaded:0
Text images, through encryption, using the Lorentz transformation, ie three-dimensional encryption program
Update : 2025-02-01 Size : 4.46mb Publisher : 马郑列

Downloaded:0
Described in detail, MD5 digital signature to achieve the function code
Update : 2025-02-01 Size : 3kb Publisher : driftage

Downloaded:0
A des base64 md5 encryption algorithm such as the realization of a variety of procedures have been tested, vc++6.0 to achieve, is applicable to any system
Update : 2025-02-01 Size : 1.9mb Publisher : 王大傻

Downloaded:0
visual C++ implementation of the AES algorithm to encrypt data files can be
Update : 2025-02-01 Size : 2kb Publisher : 王婧

Downloaded:0
This small software executable file by (. Exe) Add a new tail section (Section), and modify the entry address of PE, so that the executable file at run time, out of a password dialog box, in order to achieve a simple enc
Update : 2025-02-01 Size : 205kb Publisher : 洋洋

Downloaded:0
this program is used to activate office
Update : 2025-02-01 Size : 314kb Publisher : yuriyuri

Downloaded:0
Sound files on the timeline will be divided into paragraphs, each paragraph of the order and reversed the order of some paragraphs to realize the encryption of sound files. First, the first reading of a voice signal, the
Update : 2025-02-01 Size : 33kb Publisher : yuanyuan

Downloaded:0
The original image in the horizontal direction and vertical direction and two filters (low pass, high pass) with convolution, you can get the original image area of 4 1/4 graph, respectively, horizontal and vertical dire
Update : 2025-02-01 Size : 1kb Publisher : yuanyuan

Downloaded:0
DES algorithm used to encrypt the audio signal processing, mainly replacement and shift operations to achieve encryption.
Update : 2025-02-01 Size : 3kb Publisher : yuanyuan

Downloaded:0
The most significant bits (LSB) method of DO is the secret data (watermark data) embedded into the data in the simplest way, which is hidden data in the time domain. Any secret data can be viewed as a string of binary bi
Update : 2025-02-01 Size : 1kb Publisher : yuanyuan

Downloaded:0
Pro-test, a good hash function used
Update : 2025-02-01 Size : 1kb Publisher : KKy
« 1 2 ... .05 .06 .07 .08 .09 710.11 .12 .13 .14 .15 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.