Location:
Search - Secure input
Search list
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: |
Size: 1406512 |
Author: 周爽 |
Hits:
Description: 设计三位二进制串行输入数字锁
当收到三依次为与规定码相符的二进制数后,可以开锁,且相应绿灯亮
若1、码字不对
2、码过长或过短
3、操作程序不对
都视为错。错时红灯亮,错误2次报警,即喇叭响,并无法继续操作,直至输入管理员密码,可重新开始,并且添加了密码修改部分,在开门的状态下,用户可以修改数字锁的密码,以便可以灵活的改变密码,更加安全可靠。
-design three binary serial number lock when the input received three were in line with the provisions of the binary code number, can unlock, and accordingly if a bright green, not two code words, code is too long or too short 3, procedures are not regarded as wrong. When the red light is wrong, wrong 2nd alarm, horn ring for, and unable to continue to operate until the administrator password. the re-start, and add a password to amend part in the open state, the user can change the password lock. to be flexible to change passwords more secure.
Platform: |
Size: 525132 |
Author: 丁 |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: |
Size: 1405952 |
Author: 周爽 |
Hits:
Description: 设计三位二进制串行输入数字锁
当收到三依次为与规定码相符的二进制数后,可以开锁,且相应绿灯亮
若1、码字不对
2、码过长或过短
3、操作程序不对
都视为错。错时红灯亮,错误2次报警,即喇叭响,并无法继续操作,直至输入管理员密码,可重新开始,并且添加了密码修改部分,在开门的状态下,用户可以修改数字锁的密码,以便可以灵活的改变密码,更加安全可靠。
-design three binary serial number lock when the input received three were in line with the provisions of the binary code number, can unlock, and accordingly if a bright green, not two code words, code is too long or too short 3, procedures are not regarded as wrong. When the red light is wrong, wrong 2nd alarm, horn ring for, and unable to continue to operate until the administrator password. the re-start, and add a password to amend part in the open state, the user can change the password lock. to be flexible to change passwords more secure.
Platform: |
Size: 525312 |
Author: 丁 |
Hits:
Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: |
Size: 1024 |
Author: zyt |
Hits:
Description: 为促进极速五笔的成长,现准备将其进行开源,首先开源的部分为窗口界面部分,其它部分待编码的智能造词功能完善后也一定全部开源.
本软件项目的最终目的是使输入法更为完善,更为安全,促进中文输入法更上一个新台阶。
-Need to promote the growth of five, are prepared to carry out open-source, the first part of the open source interface for the window parts, other parts of coding to be fully functional smart coinage after a certain total revenue. The ultimate goal of software projects input method is to make better, more secure, and promote the Chinese character input method to a new level.
Platform: |
Size: 2607104 |
Author: 王华 |
Hits:
Description: 模拟键盘输入,让你上网输入密码更加安全可靠,这程序常是网上银行、支付宝等网络信息安全的不可或缺的工具!-Analog keyboard input, so you enter the password more secure and reliable Internet access, this procedure is often online banking, payment Po-peer network information security, an indispensable tool!
Platform: |
Size: 4096 |
Author: 余天 |
Hits:
Description: Want to use the standard inputbox as a login box? This code well show you how to hook the standard input box by using some API function to secure it
Platform: |
Size: 1024 |
Author: ai_pacha |
Hits:
Description: ASPCMS是由武汉上谷网络科技有限公司开发并完全开放源码的一套网站管理系统,主要面向企业进行快速的建造简洁,高效,易用,安全的公司企业网站,一般的开发人员就能够使用本系统以最低的成本、最少的人力投入在最短的时间内架设一个功能齐全、性能优异的公司企业网站。-ASPCMS Valley by Network Technology Co., Ltd., Wuhan, on the development of a fully open source website management system, mainly for the rapid construction of enterprise simple, effective, easy to use, secure corporate Web site, the average developer can use the system at the lowest cost, minimum human input in the shortest possible time, set up a fully functional, high performance of the companies corporate website.
Platform: |
Size: 1728512 |
Author: 陈祥 |
Hits:
Description: 餐饮管理系统。本系统属于小型的餐饮管理系统,可以有效地对中小型餐厅消费进行管理,本系统应达到以下目标:
系统采用人机交互的方式,界面美观友好,信息查询灵活、方便,数据存储安全可靠。
实现对餐厅顾客开台、点菜/加菜、账目查询和结账等操作。
对用户输入的数据,进行严格的数据检验,尽可能的避免人为错误。
实现对消费账目自动结算。
实现对消费的历史记录进行查询,支持模糊查询。
系统应最大限度地实现易维护性和易操作性。
-Restaurant Management System. The system is a small restaurant management system that can effectively manage small and medium sized restaurant consumption, the system should achieve the following goals: system uses interactive way, friendly and beautiful interface, information inquiry flexible, convenient, secure and reliable data storage . restaurant customers to realize the Founding, a la carte/food to eat, account inquiries and billing and other operations. on the user input data, strict data validation, as much as possible to avoid human error. achieve automated clearing accounts of consumption. realize the history of consumer inquiries and support fuzzy queries. system should be to maximize the ease of maintenance and ease of maneuverability.
Platform: |
Size: 1968128 |
Author: 韩冬 |
Hits:
Description: ASPCMS开放源码的一套企业网站管理系统,主要面向企业进行快速的建造简洁,高效,易用,安全的公司企业网站,一般的开发人员就能够使用本系统以最低的成本、最少的人力投入在最短的时间内架设一个功能齐全、性能优异的公司企业网站。-ASPCMS by Wuhan Science and Technology Co., Ltd. on the development of valley networks and a fully open-source enterprise Web site management system, mainly for the construction business for fast simple, efficient, easy to use, secure corporate Web site, the average developer to use The system at the lowest cost, minimal human input in the shortest period of time set up a full-featured, high-performance corporate website.
Platform: |
Size: 1938432 |
Author: 莫霜晨 |
Hits:
Description: YothCMS是由 石家庄优斯科技有限公司开发的一套完全开源建站系统,主要面向企业进行快速的建造简洁,高效,易用,安全的公司企业网门户站,稍具技术的开发人员就能够使用本系统以最低的成本、最少的人力投入在最短的时间内架设一个功能齐全、性能优越的公司企业网站。-YothCMS by Adams Technology Co., Ltd. Shijiazhuang excellent development of a fully open source station system, mainly for the construction business for fast simple, efficient, easy to use, secure corporate network portals, with a bit of technology developers able to use the system at minimum cost, minimum human input in the shortest period of time set up a fully functional, superior performance of corporate website.
Platform: |
Size: 3796992 |
Author: 程列熙 |
Hits:
Description: B2C电子商务网站(系统文件中有详细的系统和使用说明)
系统介绍
对于典型的数据库管理系统,尤其是B2C电子商务网站这样数据流量比较大的网络管理系统,必须要满足使用方便、操作灵活等设计需求。本系统在设计时满足以下几个目标:
1.界面设计美观友好,信息查询灵活、方便、快捷、准确,数据存储安全可靠。
2.全面、分类展示商城内所有商品。
3.显示商品的详细信息,方便顾客了解商品信息。
4.查看商城内的交易信息。
5.设置灵活的打印功能。
6.对用户输入的数据,系统进行严格的数据检验,尽可能排除人为错误。
7.提供新品上市公告,方便顾客及时了解相关信息。
8.提供网站留言功能。
9.提供网上在线支付功能。
10.系统最大限度地实现易维护性和易操作性。
11.系统运行稳定、安全可靠。-B2C e-commerce website (system file system and detailed instructions)
System Introduction
For a typical database management system, especially in B2C e-commerce sites such large network data traffic management system must meet the easy to use, flexible operation and other design requirements. The system is designed to meet the following objectives:
1. Beautiful and friendly interface design, information search and flexible, convenient, fast, accurate, secure and reliable data storage.
2. full, mall display all merchandise categories.
3. shows the details of goods, customers understand the product information.
4.view transaction information within the mall.
5.Set flexible printing capabilities.
6.on the user input data, strict data test systems, as far as possible exclude human error.
7. Providing new listing announcement, customers keep abreast of relevant information.
8.to provide web voicemail.
9.to provide online payment capabilities.
10.system to maximize the e
Platform: |
Size: 1413120 |
Author: 宋健刚 |
Hits:
Description: 实验三:加密
实验目的:1.解决问题的基本技巧
2.编写伪码
3.实现算法
4.修改程序以执行不同的任务
问题描述:一家公司希望通过电话传输数据,但担心电话可能会遭到监听。所有的数据都是
以四位整数进行传输的。该公司要求你编写一个程序,对数据进行加密,一边数据的传输更加安全。应用程序应在输入对话框中读取用户输入的四位整数,然后按如下方式对其加密:计算各位数加上7后的和,再除以10,用所得到的余数替换对应的数字。然后交换第一个数字和第三个数字,第二个数字和第四个数字。显示加密后的整数。
-Experiment 3: Encryption experimental purposes: 1. Problem-solving skills 2. Write pseudo-code algorithm to modify the program to perform different tasks: a company wants to transfer data via telephone, but worried phone may be subject to monitoring. All data are based on four integer transmission. The company asks you to write a program to encrypt data, while the data transfer more secure. The application should read the user to enter four integers in the input dialog box, and then encrypting it follows: Calculate the Honourable plus 7 after, and then divided by 10, with the remainder replaced by the corresponding number. And then swap the first digit and the third digit, the second number and the fourth digit. Display the encrypted integer.
Platform: |
Size: 35840 |
Author: 哦也啊 |
Hits:
Description: 本系统属于中小型企业ERP管理系统,可以对中小型生产企业或商业企业进行有效管理。通过本系统可以达到以下目标:
灵活的录入数据,使信息传递方便、快捷;
系统采用人机交互方式,界面美观友好,操作灵活方便,业务流程控制严谨,数据存储安全可靠;
严格按操作功能来分配权限;
严格控制业务流程,主动向用户提示业务流程信息;
各种单据的最终确认,需要具有审核权限的人员进行审核操作;
客户分析采用图形化显示,直观明了;
实现各种综合查询和模糊查询;
实现企业客户及其内部资源的信息集成化管理;
对用户输入的数据,进行严格的数据检验,尽可能避免人为错误;
系统最大限度地实现了易维护性和易操作性。-The system belongs to the small and medium enterprises ERP management system, effective management for small and medium-sized manufacturing enterprises or commercial enterprises. The information passed through the system can achieve the following objectives: a flexible data entry, convenient, fast system uses human-computer interaction, beautiful and friendly interface, easy operation, strict control of business processes, secure and reliable data storage strict operating functions. assign permissions strict control of business processes, business process initiative to prompt the user information final confirmation of the various documents with audit authority personnel audit operations customer analysis using graphical, intuitive and clear achieve integrated query and fuzzy queries achieve integrated management of corporate customers and its internal resources strict inspection of the data on the data input by the user, as much as possible to avoid human error maximize system
Platform: |
Size: 9884672 |
Author: 喻磊 |
Hits:
Description: VB_ACCESS库存管理系统_X_L
系统特色:
1.设置系统用户登陆功能,即时对系统数据进行安全设置与保护。
2.友好的用户界面,业务操作简单,进入系统即能使用。
3.成熟先进的技术和系统构架,采用先进的数据库访问方式,数据更安全,性能更稳定。
4.强大的数据处理能力和开放的数据接口,选用具有大型数据库安全机制的数据库系统,提供各种级别的数据保护和权限控制方式,确保数据的安全可靠。
5.系统每种操作都可以通过菜单来进行。操作快捷、方便。易懂易会。系统集输入、维护、查询、统计和各种处理为一体,信息导入导出方便共享。
-VB_ACCESS inventory the management system _X_L system Features: set the system user login function, real-time system data security settings and protection. 2 simple friendly user interface, business operations, and access to the system that is able to use. Mature state-of-the-art technology and system architecture, advanced database access, the data is more secure, more stable performance. Powerful data processing capabilities and open data interface, the choice of a database system with a large database security mechanisms to provide various levels of data protection and access control way to ensure the safety and reliability of the data. 5. System for each operating menu. The operation is fast and convenient. Easy to understand and will. System set input, maintenance, query, statistics and various processing, data import and export easily shared.
Platform: |
Size: 771072 |
Author: |
Hits:
Description: 安全散列算法SHA1,主要用于数字签名。输入数据的最大长度为2^64,输出为160位的散列函数值-Secure Hash Algorithm SHA1, and mainly used for a digital signature. The maximum length of the input data is 2 ^ 64, the output of 160-bit hash function value
Platform: |
Size: 6144 |
Author: renjing |
Hits:
Description: 本书第一部分讲述的是传统的网络接口N e t B I O S、重定向器以及通过重定向器进行的各类网络通信。尽管本书大部分内容均围绕Wi n s o c k编程这一主题展开,但是,A P I比起Wi n s o c k
来,仍然具有某些独到之处。其中,第1章探讨的是N e t B I O S接口,它和Wi n s o c k类似,也是
一种与协议无关的网络A P I。N e t B I O S提供了异步调用,同时兼容于较老的操作系统,如O S / 2
和D O S等等。第2章讨论了重定向器的问题,它是接下去的两个新主题—邮槽(第3章)和
命名管道(第4章)的基础。重定向器提供了与传输无关的文件输入/输出方式。邮槽是一种
简单的接口,可在Wi n d o w s机器之间实现广播和单向数据通信。最后,命名管道可建立一种双向信道,这种信道提供了对Wi n d o w s安全通信的支持。-The first part of the book tells the story of a traditional network interface N et BIOS Redirector redirector various types of network traffic. Although most of the contents of this book are around Wi nsock programming this theme than Wi nsock to, but, API still has some unique. The first chapter discusses N et BIOS interface, it and Wi nsock similar, also a protocol-independent network API. N et BIOS provides asynchronous call, at the same time compatible with the older operating system, such as OS/2 and DOS. Chapter 2 discusses the redirect problem, it is the two new theme- Mailslot (Chapter 3), and named pipes (Chapter 4), the basis of next. The redirector has nothing to do with the transmission file input/output mode. A mail slot is a simple interface, broadcast and one-way data communications between Wi ndows machine. Finally, Named Pipes to establish a two-way channel, this channel provides support for Wi ndows secure communications.
Platform: |
Size: 16768000 |
Author: 刘宝 |
Hits:
Description: npapi开发的input框 安全登录控件的基础 可以根据这个基本继续开发-the development input box secure login control npapi can continue to develop in accordance with the basic
Platform: |
Size: 7168 |
Author: 大崔 |
Hits:
Description: 屏幕软键盘,是开发键盘输入程序和安全输入的选择,c++开发。-On-screen keyboard, keyboard input program is to develop and secure input selection, c++ development.
Platform: |
Size: 2742272 |
Author: pz |
Hits: