Location:
Search - cd protection
Search list
Description: 此为本书的配套光盘.本书不但由浅入深地讲解了软件保护技术,而且还精选并剖析了一些破解实例,并从一定的角度透视解密者的心态,在多处对照了软件保护与破解的思维方法。主要内容有:软件加密的发展历史、误区、方法,以及与特定语言相关的软件加密技术;破解技术剖析,以及常见的软件加密薄弱环节;PE技术、实战外壳加密与反脱壳技术(附大量示例源码),并提供了作者自己编写的小工具(加壳工具PEMaker等);调试技术与反调试技术(附大量示例源码);软件加密技巧与整体方案设计;加密锁分类及其使用技巧(智能卡加密锁)。-this be supporting the CD. The book not only elementary to explain the software protection technology, but also selected and analyzed some scary examples, and from a certain angle lens decryption of mentality in various control software protection and crack way of thinking. The main contents are : encryption software in the history of misunderstanding, methods, and with the specific language-related software encryption technology; Crack technical analysis, and common weak link encryption software; PE technology, real shell encryption technology and anti-sabot (A large sample source), and mention the author himself for the preparation of small tools (PEMaker shell tools, etc.); Debugging and anti-debugging techniques (A large sample source); software encryption techniques and overall progra
Platform: |
Size: 12813373 |
Author: 陶立欣 |
Hits:
Description: 此为本书的配套光盘.本书不但由浅入深地讲解了软件保护技术,而且还精选并剖析了一些破解实例,并从一定的角度透视解密者的心态,在多处对照了软件保护与破解的思维方法。主要内容有:软件加密的发展历史、误区、方法,以及与特定语言相关的软件加密技术;破解技术剖析,以及常见的软件加密薄弱环节;PE技术、实战外壳加密与反脱壳技术(附大量示例源码),并提供了作者自己编写的小工具(加壳工具PEMaker等);调试技术与反调试技术(附大量示例源码);软件加密技巧与整体方案设计;加密锁分类及其使用技巧(智能卡加密锁)。-this be supporting the CD. The book not only elementary to explain the software protection technology, but also selected and analyzed some scary examples, and from a certain angle lens decryption of mentality in various control software protection and crack way of thinking. The main contents are : encryption software in the history of misunderstanding, methods, and with the specific language-related software encryption technology; Crack technical analysis, and common weak link encryption software; PE technology, real shell encryption technology and anti-sabot (A large sample source), and mention the author himself for the preparation of small tools (PEMaker shell tools, etc.); Debugging and anti-debugging techniques (A large sample source); software encryption techniques and overall progra
Platform: |
Size: 13782016 |
Author: 陶立欣 |
Hits:
Description: CDROM的控制和系统保护,使用系统的api函数实现的cd的控制及对系统的开关机的实现-CDROM control and system protection, use the system api function to achieve the cd on the system control and switching machines realize
Platform: |
Size: 80896 |
Author: 刘为 |
Hits:
Description: 如你想系统地学习加解密知识,请参考由本站与广大网友合作推出的新书《加密与解密--软件保护技术及完全解决方案 》,本书全面介绍Windows下软件的保护与破解技术,内容全面,讲解详细,配套光盘备有实战习题,适合各位爱好者使用。-If you would like to systematic study of encryption and decryption of knowledge, please refer to the website with the vast number of users to launch new book, encryption and decryption- software protection techniques and complete solution , this book a comprehensive introduction to Windows, under the protection and crack software technology, content comprehensive, detailed on the supporting CD-ROM with actual combat exercises, suitable for all fans to use.
Platform: |
Size: 1959936 |
Author: yeymsf |
Hits:
Description: 目前使用最广泛的软件保护方法,我们可以将其分为两类:依赖硬件的保护文案和不依赖硬件的保护方案。依赖硬件的保护方案主要有:软盘保护,加密卡保护,软件锁保护(俗称“加密狗”)以及光盘加密等,这些方案的共同特点就是保护措施都要涉及某一具体的硬件来实现,涉及的硬件可能是软件盘,U盘,光盘或者其它外接设备-At present, the most widely used method of software protection, we can be divided into two categories: dependent on the protection of hardware and do not rely on hardware copy protection program. Rely on hardware protection programs include: a floppy disk protection, encryption card protection, software protection lock (commonly known as dongle ), as well as CD-ROM, such as encryption, a common feature of these programs is that protective measures should be involved in a specific hardware to achieve, involving The hardware may be the software disk, U disk, CD-ROMs or other external equipment
Platform: |
Size: 592896 |
Author: 姚磊 |
Hits:
Description: 音频数字水印在版权保护中的应用
本文将数字水印技术应用于数字产品的版权保护中, 可以在MP3、CD 等作品中嵌入水印, 在人耳不能察觉的情况下达
到版权保护的目的, 并提出基于离散小波变换的音频数字水印方案和一种基于小波变换的音频数字水印的隐藏和检测算
法———基于信噪比确定伸缩因子α的自适应加性音频水印算法。-Application on Copyright Protection of Audio Digital Watermarking
Platform: |
Size: 167936 |
Author: Echo |
Hits:
Description: CD protection - craking-CD protection- craking
Platform: |
Size: 27648 |
Author: cube16 |
Hits:
Description: XACML3.0定义了一种通用的保护资源的策略语言和访问决策语言,并且与基于属性的授权机制结合,可提供对资源进行细粒度的访问控制,为建立Web服务的访问控制模型提供技术支持。文档针对XACML3.0对应的xacml-3.0-core-spec-cd-03-en.pdf规定包括XACML模型、策略语言模型、策略句法以及处理规程的核心XACML语言。xacml-3.0-rbac-v1-spec-cd-1-en.pdf规定XACML基于核心和层次角色的接入控制(RBAC)轮廓。xacml-3.0-multiple-v1-spec-cd-03-en.pdf规定XACML多资源轮廓。-XACML3.0 define a common strategy for the protection of resources, language and access to decision-making language, and attribute-based authorization mechanism combination, can provide fine-grained resource access control, for the establishment of access control model for Web services to provide technical support. Documentation for XACML3.0 corresponding xacml-3.0-core-spec-cd-03-en.pdf provisions include the XACML model policy language model, strategy, and handling procedures syntactic core XACML language. xacml-3.0-rbac-v1-spec-cd-1-en.pdf provides XACML core and hierarchical role based access control (RBAC) profile. xacml-3.0-multiple-v1-spec-cd-03-en.pdf XACML provides many resources profile.
Platform: |
Size: 4018176 |
Author: lichao |
Hits:
Description: 该软件是用差动保护计算的,大大地简化计算,十分实用。-The software is calculated using differential protection, greatly simplify the calculation, is very practical.
Platform: |
Size: 77824 |
Author: 李灯 |
Hits:
Description: 克里斯,卡巴斯基 光盘拷贝保护技术,用于破解正版光盘的防盗版技术-Chris, Kaspersky CD copy protection technology for CD-ROM genuine crack anti-piracy technology
Platform: |
Size: 2159616 |
Author: Ben |
Hits:
Description: 功能:
1.在内存中开辟一个虚拟磁盘空间作为文件存储器,在其上实现一个多用户多目录的文件系统。
2.文件物理结构可采用显式链接或其他方法。
3.磁盘空闲空间的管理可选择位示图或其他方法。如果采用位示图来管理文件存储空间,并采用显式链接分配方式,则可以将位示图合并到FAT中。
4.文件目录结构采用多用户多级目录结构,每个目录项包含文件名、物理地址、长度等信息,还可以通过目录项实现对文件的读和写的保护。目录组织方式可以不使用索引结点的方式,但使用索引结点,则难度系数为1.2。
5.设计一个较实用的用户界面,方便用户使用。要求提供以下相关文件操作:
(1)具有login (用户登录)
(2)系统初始化(建文件卷、提供登录模块)
(3)文件的创建: create
(4)文件的打开:open
(5)文件的读:read
(6)文件的写:write
(7)文件关闭:close
(8)删除文件:delete
(9)创建目录(建立子目录):mkdir
(10)改变当前目录:cd
(11)列出文件目录:dir
(12)退出:logout
-Functions:
1. In memory open up a virtual disk space as a file storage, on its more than a user realize how directory file system.
2. The physical structure can file by explicit links or other methods.
3. Free disk space management can choose a diagrams of or other methods. If using a chart to management and file storage space, and by explicit links distribution methods, it can select a diagrams of merge to FAT.
4. File directory structure using multi-level user directory structure, each directory contains a file name, physical address, length and other information, but also through a catalogue of the file realize read and write protection. Catalogue organization can not use index node way way, but use index node, the difficulty coefficient is 1.2.
5. Design a practical user interface, and user-friendly. Required to provide the following documents operation:
(1) have login (user login)
(2) system initialization (built file roll, and provide login module)
(3) files created: crea
Platform: |
Size: 1401856 |
Author: longer |
Hits:
Description: 1. 在内存中开辟一个虚拟磁盘空间作为文件存储器,在其上实现一个多用户多目录的文件系统。
2. 文件物理结构可采用显式链接或其他方法。
3. 磁盘空闲空间的管理可选择位示图或其他方法。如果采用位示图来管理文件存储空间,并采用显式链接分配方式,则可以将位示图合并到FAT中。
4. 文件目录结构采用多用户多级目录结构,每个目录项包含文件名、物理地址、长度等信息,还可以通过目录项实现对文件的读和写的保护。目录组织方式可以不使用索引结点的方式,但使用索引结点,则难度系数为1.2。
5. 设计一个较实用的用户界面,方便用户使用。要求提供以下相关文件操作:
(1)具有login (用户登录)
(2)系统初始化(建文件卷、提供登录模块)
(3)文件的创建: create
(4)文件的打开:open
(5)文件的读:read
(6)文件的写:write
(7)文件关闭:close
(8)删除文件:delete
(9)创建目录(建立子目录):mkdir
(10)改变当前目录:cd
(11)列出文件目录:dir
(12)退出:logout
-
Allow phonetic typing
EnglishSpanishArabic
A.In memory to open up a virtual disk space, file storage, file system on more than one user directory.
Two. Document physical structure can be explicitly links or other methods.
3. Disk free space management selectable bit diagram or other means. If you use the diagram to manage file storage space, and explicitly links allocation, the bit to show maps of the FAT.
4. The file directory structure using the multi-user multi-level directory structure, each directory entry contains the file name, physical address, the length of the file read and write protection, but also through the directory entry. Directory organization can not use the index nodes of the way, but using an index node, then the difficulty factor of 1.2.
5 Design a practical user interface, user-friendly. Request the relevant documents of the following:
(1) login (user login)
(2) The system is initialized (build file volume to provide the login module)
(3) file creati
Platform: |
Size: 3136512 |
Author: 金国跃 |
Hits:
Description: 看雪《加密解密第三版》随书光盘的第6章。
内含md5 sha aes idea tea rsa elgamal 椭圆曲线 base64 等常见加解密算法,因此特地从中抽出,以便学习。
感兴趣的同学,可以购买原书,这是一本国人写的关于软件破解与软件保护的优秀著作。-See Chapter 6 of the Snow encryption and decryption of the third edition of the CD with the book. Contains md5 sha the aes idea the tea the rsa elgamal elliptic curve base64 common encryption and decryption algorithm specially withdrawn from, in order to learn. Interested students can purchase the original book, which is a national people write excellent books on the software and software protection.
Platform: |
Size: 4931584 |
Author: jt |
Hits:
Description: this project is flash player protector
functions in swf files encrypted and only work with this flash player project.
this player have some anti break and anti debug and ... to more protection
Platform: |
Size: 2673664 |
Author: mskicker |
Hits: