Welcome![Sign In][Sign Up]
Location:
Search - CRYPT

Search list

[CA authCapicomSgned

Description: How to create your personal CA certificate, signed your software, Crypt string or files with sha1-md5! Enjoy
Platform: | Size: 4878336 | Author: TakeOver | Hits:

[Crack Hacksdes

Description: simple des algo Crypt or De
Platform: | Size: 4096 | Author: Hellsonic | Hits:

[BooksCgi-Editor

Description: cgi编辑器基于VB abs accept alarm atan2 bind binmode bless caller chdir chmod chomp chop chown chr chroot close closedir connect cos crypt dbmclose dbmopen defined delete die do dump each eof eval exec exists exit exp fcntl fileno-CGI EDITORabs accept alarm atan2 bind binmode bless caller chdir chmod chomp chop chown chr chroot close closedir connect cos crypt dbmclose dbmopen defined delete die do dump each eof eval exec exists exit exp fcntl fileno
Platform: | Size: 68608 | Author: 安当 | Hits:

[Windows Developstrcrypt

Description: Simple and very small string crypt/decrypt function Without using the cryptinit you can already define encrypted strings in the source. Using the cryptinit function you get a random cryptkey and you need to encrypt all plain strings first. Example in commented in the source.
Platform: | Size: 1024 | Author: Hans211 | Hits:

[Linux-Unixsecurity

Description: 加密算法,包括 aes des rsm等常用算法-crypt algorithm
Platform: | Size: 2048 | Author: 谢山 | Hits:

[Crack Hackccrypt-1.9

Description: ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government s chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
Platform: | Size: 669696 | Author: jmskhng | Hits:

[SCMHCS201_cn

Description: Microchip Technology Inc. The crypt key, serial number and configuration data are stored in an EEPROM array which is not accessible via any external connection. The EEPROM data is pro-grammable but read-protected.
Platform: | Size: 684032 | Author: diger | Hits:

[WEB Codecrypt.txt.tar

Description: I use my blog as literally an online journal to record my activities and thoughts so I can look back at them later. Writing things down can also be therapeutic. As a side benefit, it serves as a form of communication with my friends and randoms (it helped me get my apartment).
Platform: | Size: 1024 | Author: gto | Hits:

[CA authMcbDES

Description: System for Crypt Decrypt Triple Des.
Platform: | Size: 47104 | Author: gpaz | Hits:

[Crack HackCrypt

Description: AES高级加密算法源码。不错哦。有需要的人可以分享下-AES
Platform: | Size: 874496 | Author: zhao shufen | Hits:

[Windows DevelopBlowfishVB_6a

Description: Blowfish Crypt-decrypt algorithm
Platform: | Size: 131072 | Author: ariadnet | Hits:

[Other0523322

Description: 基于vb的加密算法,供大家研究使用,谢谢!-crypt
Platform: | Size: 9216 | Author: crx | Hits:

[CA authrc4crypt

Description: rc4 RC4 was initially a trade secret, but in September 1994 a description of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4. Because the algorithm is known, it is no longer a trade secret. The name "RC4" is trademarked, however. RC4 is often referred to as "ARCFOUR" or "ARC4" (meaning Alleged RC4, because RSA has never officially released the algorithm), to avoid possible trademark problems. It has become part of some commonly used encryption protocols and standards, including WEP and WPA for wireless cards and TLS.
Platform: | Size: 10240 | Author: long | Hits:

[Compress-Decompress algrithmskey-wrap

Description: help you underestand crypt metod
Platform: | Size: 149504 | Author: newsatkey | Hits:

[CA authrc4dotnet

Description: cr4-dotnet RC4 was initially a trade secret, but in September 1994 a description of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4. Because the algorithm is known, it is no longer a trade secret. The name "RC4" is trademarked, however. RC4 is often referred to as "ARCFOUR" or "ARC4" (meaning Alleged RC4, because RSA has never officially released the algorithm), to avoid possible trademark problems. It has become part of some commonly used encryption protocols and standards, including WEP and WPA for wireless cards and TLS.
Platform: | Size: 13312 | Author: long | Hits:

[Internet-Networksnmp__3.2

Description: snmp++3.2是HP公司基于snmp协议的开发包,以实现snmp网络管理软件开发-snmp++3.2 produced by hp is based snmp protocol to achieve snmp network manage software
Platform: | Size: 3290112 | Author: bryant | Hits:

[Crack Hackunixcrypt

Description: DES Crypt adapted from unix crypt for delphi.
Platform: | Size: 349184 | Author: derkan | Hits:

[JSP/JavaCrypt

Description: 用Java编写地dos下地文件加密及解密。详细内容内详-Shimoji using Java write to dos file encryption and decryption. Details in some detail in
Platform: | Size: 1024 | Author: 韩一凡 | Hits:

[CSharpclient

Description: capicom crypt\decrypt file ntr
Platform: | Size: 7168 | Author: wqs2010 | Hits:

[Communication-Mobilephonecrypt_14

Description: is phone crypt software
Platform: | Size: 1024 | Author: cyberra2n | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 18 »

CodeBus www.codebus.net