Welcome![Sign In][Sign Up]
Location:
Search - 安全存储

Search list

[Crack Hackpoc-1.2

Description: 在卡片上管理密码的工具。密码被标注并集体加密存储在卡片上。因此这是一个安全存储密码的方法-on the card password management tool. Tagging password encryption and collective memory on the card. So this is a safe method of storage of passwords
Platform: | Size: 167409 | Author: 张光强 | Hits:

[Program docUSB安全钥功能扩展与优化设计

Description: USB Security key集数据加密与数据存储功能。 介绍DES加密,以及HID 设备读写。。。
Platform: | Size: 97947 | Author: jodan179 | Hits:

[SourceCode加密解密 安全存储

Description: C#实现对图像、视频、音频进行加密解密·· 安全存储
Platform: | Size: 5176 | Author: 276565800@qq.com | Hits:

[Crack Hackpoc-1.2

Description: 在卡片上管理密码的工具。密码被标注并集体加密存储在卡片上。因此这是一个安全存储密码的方法-on the card password management tool. Tagging password encryption and collective memory on the card. So this is a safe method of storage of passwords
Platform: | Size: 166912 | Author: 张光强 | Hits:

[GUI Develop[文本加密器]

Description: 功 能:• 对文本文件(.txt)进行加密、解密。加密后文件(密文)存储形式为后缀为.tyc的文件。 • 加密、解密都设有保存原文件或删除原文件的不同选项。用户可根据个人要求自主选择。 • 加密时若用户所设密码小于6个字符,将自动弹出安全提示。可以选择返回加重新设置密码;可以忽略,继续进行加密;可以取消退出程序(退出前将有提示,确认是否真的退出)。 • 另:本软件易上手,非常适合非专业人士使用。 附有“每日提示”,软件启动时自动弹出,对用户密码设置方法进行提示(有关强、弱口令/密码的设置)。 -function :# 8,226 pairs of text files (. Txt) for encryption, decryption. Encrypted files (ciphertext) storage form of a suffix of. Tyc document.# 8226 encryption, decryption are equipped with preservation of the original paper document or delete the different options. Users may request a personal choice.# 8226 if the encryption password users have less than six characters, pop-up safety tips. Choose to increase reset passwords; Neglect can continue encryption; The abolition of exit (exit will be suggested before confirming whether withdrawal). Another# 8226 : This software hidden, very suitable for non-professional users. With "the daily suggested", the software automatically activated pop-up, the user password settings suggest methods (the strong and weak passwords/passwo
Platform: | Size: 55296 | Author: 周百 | Hits:

[Technology ManagementSQLServercankaoziliao

Description: SQL Server参考资料,讲解详细.主要有:数据库查询和视图.doc,存储过程与触发器.doc,PB与SQL Server开发与编程.DOC,系统安全管理.doc等。-SQL Server reference to explain the details. Major : Database Query and View. Doc, the storage process and triggers. Doc, PB and Development and SQL Server Programming. DOC, system security management. Doc other.
Platform: | Size: 8032256 | Author: 熊哥 | Hits:

[Crack Hackjiamijiemicodesource

Description: 计算机信息的保密显得越来越重要。数据保密变换,或密码技术,是对计算机信息进行保护的最实用和最可靠的方法。现阶段计算机硬盘以及其他大容量存储介质代替了纸张成为信息存储的主要方式,随之带来的信息安全问题也日渐突出,电子文档的信息安全成为一个至关重要的问题.电子文档的安全问题发生在两个场合:动态的传输途中、静态的存储形式.对于电子文档的传输安全,可以通过数据加密技术先加密再传输、保证电子文档的合法性和完整性 要完成的工作: 1. 对网络安全的基本概念和基本原理有一个了解。 2. 对各种加密与解密的算法做深入的理解。 3. 选择合适的算法编写程序。 4. 调试程序。 这个是源代码的打包哦! -the confidentiality of computer information are becoming increasingly important. Transform data confidentiality, or password technology, the computer information for the protection of the most practical and most reliable method. This stage of computer hard disks and other large-capacity storage medium instead of paper as the main information storage, the attendant's information security issues have become increasingly prominent, electronic document information security has become a critical issue. Electronic document security problem occurred in the two occasions : Transmission dynamics of the way, the storage form of static. for electronic document transmission security, through data encryption technology first re-transmission encryption to ensure the legality of electronic documents
Platform: | Size: 1341440 | Author: 吕文奎 | Hits:

[Crack HackUsbKeyInitTools

Description: 作为信息安全的一辅助工具,主要用于初始化USBKEY,从而使USBKEY存储用户的相关信息.-information security as an auxiliary tool, mainly for the initialization USBKEY. USBKEY storage so that users of relevant information.
Platform: | Size: 74752 | Author: clzhou | Hits:

[OS programvfs

Description: 在Windows的环境下在用户级实现一个单用户一级目录结构的模拟文件系统。实 现步骤如下: 1、先建立一个100mb的文件; 2、模拟文件系统建立在这个文件的基础上。 3、文件存储资源管理机制采用空闲块链结构。 4、目录采用一级目录结构。 5、文件结构采用索引结构,规定每个文件最多占用16个磁盘块,文件索引表存放在文件目录项中,采用直接索引结构。 6、打开文件结构采用文件控制块和系统打开文件表结构。 7、实现文件创建、打开、关闭、读、写和显示文件目录操作。 8、暂时不考虑文件的安全、保密和存取控制的功能。 -err
Platform: | Size: 4096 | Author: 龙锦就 | Hits:

[SCMFrequenzzaehlerV0_1

Description: 自己制作51开发板. 带自恢复保险丝,试验安全,40Pin锁紧插座适用于4~40脚芯片,可以自由配置电源引脚。 板上资源: 1、6个高亮数码管显示(数字和字母显示) 2、8个独立优质按键(2Pin)(人机接口输入) 3、8个高亮发光二极管(跑马灯、指示灯、红绿灯等) 4、标准的RS232通信接口(PC通信) 5、一体化红外接收头(高灵敏度) 6、遥控器用红外发射管(广发射 角)可以模拟遥控器。 7、蜂鸣器(报警以及声音提示) 8、一路继电器输出 9、EEPROM 24C02(数据存储) 10、ADC0832转换器接口(模数转换) 11、DS18B20接口(精密温度检测) 12、USB口供电,带自恢复保险丝保护 13、加装优质电源开关 14、晶振采用拔插方式,可以使用于不同频率 15、DC电机接口(直接接入小功率直流电机即可) 16、4相步进电机接口(直接接入即可) 17、音频扬声器接口(直接接入可以播放音乐、声波) 18、经典复位电路 19、ISP 10Pin下载线接口 20、标准并口下载线
Platform: | Size: 369664 | Author: kehan | Hits:

[source in ebookOA

Description: 本系统包含250多个JavaBean类,整个系统全面实现MVC(模型 视图 控制)三层架构, 大量的应用到了类的反射机制涉及网络编程行业最高精尖技术STRUTS+HIBERNATER,最有说 服力的证实了多层建构框架模式的绝优越性。数据和逻辑处理由STRUTS的模型层Model进行处理, 页面调转由STRUTS的控制层Controller实现,页面负责显示请求和响应,大大增强了“人机”的 互动性,这一层在STRUTS的视图层View用STRUTS标签+HTML等实现,同时使用validator验证框架进行 数据检验。数据的存储和持久化由HIENATER持久层实现,数据库采用MYSQL,数据源采用数 据源连接池机制,整个系统完全贯穿JAVA面向对象的概念,全面完整地实现了JAVA的封装性 ,继承性,多态性的三大特征,完全按照J2EE企业级网络应用程序的开发方案设计和开发, 所有的繁重的计算和处理都由服务器端处理,运行速度快,安全稳定,数据库采用MYSQL大大减轻 了客户端用户机CPU频率受制的局限,同时绝对的安全性和稳定性是本系统最强大,最重要的设计 开发组成部分。-err
Platform: | Size: 29164544 | Author: 拼搏 | Hits:

[Embeded-SCM DevelopFRAMmemorysource

Description: 51单片机对铁电存储器进行安全读写的程序。改程序采用C语言编程。-51 Single-chip ferroelectric memory of reading and writing to carry out safety procedures. Reform procedures for the use of C language programming.
Platform: | Size: 8192 | Author: 王伟 | Hits:

[USB developusbsafeandsecret

Description: 计算机信息安全,USB移动存储泄密解决方案,技术性文档!-Computer information security, USB mobile storage solutions secrets, technical document!
Platform: | Size: 1555456 | Author: 何毅勋 | Hits:

[Software EngineeringLinuxApplicationIntrduction

Description: Linux实用教程 涉及Linux存储管理、内核结构、文件管理、系统调用、系统管理、网络基础、网络安全、编程基础等实用内容。-Linux Practical Guide related to Linux storage management, kernel structure, document management, system calls, system management, network infrastructure, network security, programming based on content, such as practical.
Platform: | Size: 8336384 | Author: liz | Hits:

[Driver DevelopWindows_Kernel_Security_Programme

Description: 这是《寒江独钓——Windows内核安全编程》配书光盘,源码包括:Windows串口与键盘过滤驱动、Windows虚拟存储设备与存储设备过滤驱动、Windows文件系统过滤驱动、文件系统透明加密/解密驱动、Windows各类网络驱动(包括TDI过滤驱动及3类NDIS驱动),以及最新的WDF驱动开发模型-This is the " Snowy River fishing alone- Windows kernel security programming" book with CD-ROM, source code, including: Windows serial port with the keyboard filter driver, Windows virtual memory storage device and filter device driver, Windows file system filter drivers, file system transparent encryption/decryption drive, Windows all types of network drives (including the TDI filter driver and 3 NDIS driver), as well as the latest model-driven development of the WDF
Platform: | Size: 2040832 | Author: lq7972 | Hits:

[Windows MobileSecureStore

Description: 学习如何在 Microsoft PPC 手机上实现 Cryptographic 加密、解密服务,进行数据的安全存储。。 -Learn how to achieve the Microsoft PPC phone Cryptographic encryption, decryption services, the security of data storage. .
Platform: | Size: 195584 | Author: george | Hits:

[Internet-Network2009NationaPrincipalContestset

Description: 2009 年全国大学生信息安全竞赛获奖作品集 目 录 一等奖作品 基于安全交换机的ARP 攻击自动防御系 ........................................................... 1 USB 设备加密转接口 ............................................................................ 5 基于语义完整性的隐藏恶意代码检测系统 ......................................................... 9 进程动态完整性检测系统 ...................................................................... 13 支持多还原点的磁盘隔离系统 .................................................................. 17 Final (风诺)Web 服务防护系统 ................................................................ 21 基于硬件平台的移动存储设备信息隐藏系统 ...................................................... 24 支持多通道多任务的网络舆情监测与分析系统 .................................................... 27 基于交换分区的主机行为安全检测系统 .......................................................... 31 可疑程序威胁分析系统 -2009 National College contest winning set of information security CONTENTS First Prize works ARP attack on safety switch automatically Defense Department ......................................... .................. 1 USB Device Interface ............................................. encryption switch ............................... 5 Semantic integrity of hidden malicious code detection system ........................................ ................. 9 The integrity of the process of dynamic testing system ............................................ .......................... 13 Support multi-disk separation system restore point .......................................... ........................ 17 Final (wind Connaught) Web Service protection system ......................................... ....................... 21 Hardware-based platform for mobile storage devices information hiding system ........................................ .............. 24 Multi-channe
Platform: | Size: 8192000 | Author: 林珺 | Hits:

[Linux-Unixtpmdd-2.6.16

Description: TPM芯片可以使你使用硬件来安全存储和保护你的密钥和个人数据,该工程文件为TPM芯片提供了一个Linux内核设备驱动。解压后文件名为tpmdd-2.6.16.tgz-This project provides a Linux kernel device driver to enable the TPM chip as described by Trusted Computing Group specifications. The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. The Trusted Comuting Group specifications also describes a library for application access to the TPM funcitonality. A Linux implementation of this Trusted Software Stack (TSS) library is TrouSerS. Work is ongoing to have this driver accepted into the vanilla Linux kernel.
Platform: | Size: 49152 | Author: ytz | Hits:

[Software EngineeringAT88SC0104C

Description: 本文首先介绍了AT88SC0104C~25616C协议认证卡的主要特点、基本功能、安全存储原理、协议认证过程以及开发方法-product code
Platform: | Size: 22528 | Author: PETER | Hits:

[CA authencrytion_COM

Description: 随着计算机通信技术与Internet的飞速发展,用户对信息的安全存储、安全处理和安全传输的需求越来越迫切。本文首先论述了网络数 据加密技术,接着分析了网络数据安全研究的必要性,最后阐述了数据加密在网络通信中的应用-With the computer and communication technologies and the rapid development of Internet users about the security of storage, safe handling and secure transport needs more urgent. This paper discusses the network data encryption, and then analyzes the necessity of the research network data security, data encryption in the last described in the application of network communication
Platform: | Size: 1346560 | Author: 佳佳 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 20 »

CodeBus www.codebus.net