Welcome![Sign In][Sign Up]
Location:
Search - file protect

Search list

[Crack Hackbhxex

Description: 本程序能够在EXE程序运行之前弹出一个输入密码对话框,保护EXE程序,防止非法用户执行。 本程序的技术是直接修改EXE文件的入口,并把代码加入到EXE文件中[像不像一个病毒:)]。而不是象很多流行的程序一样把加密的程序作为数据,运行的时候再解出来,那样太不安全了:) 我相信不下你会后悔的!-This procedure can be run before EXE pop up a dialog box to enter a password to protect EXE procedures to prevent unauthorized users to implement. This procedure is a direct modification of the technology import EXE file and the code added to the EXE file [like a virus:)]. Rather than, as many of the same popular procedures as a data encryption program, run out of time to re-solution, that is too unsafe a:) I believe you will regret it more than the!
Platform: | Size: 55296 | Author: lypdl | Hits:

[Process-ThreadPEEncrypt

Description: PEEncrypt PE加密程序Delphi源代码,能保护你的PE文件-PEEncrypt PE encryption Delphi source code, to protect your PE file
Platform: | Size: 402432 | Author: 吴铭 | Hits:

[Driver DevelopProtectFiles

Description: 以filemon开源代码为模板,加以修改,增加界面控制程序,可以添加指定文件加以保护(禁止被shift+del删除)。-FileMon in open source code as a template, modified to increase the interface control program, you can add the specified file to protect (Prohibition was shift+ Del delete).
Platform: | Size: 732160 | Author: 王飞 | Hits:

[Windows DevelopPloyBox

Description: Anskya Polymorphic Packer V 1.3 Code By Anskya Thank:Aphex,Madshi,Gregory,~LOM~ Big Thank:Aphex,sforever,zxxfox,AngleAngel GST Http://www.Godexp.com Web Http://www.Anskya.net Explanation: Produce and encrypt the key with grade, the additional data are measured the file protect of PE is compressed.-Anskya Polymorphic Packer V 1.3Code By Anskya Thank: Aphex, Madshi, Gregory, ~ LOM ~ Big Thank: Aphex, sforever, zxxfox, AngleAngelGST Http:// www.Godexp.comWeb Http:// www.Anskya.netExplanation:Produce and encrypt the key with grade, the additional data are measuredthe file protect of PE is compressed.
Platform: | Size: 505856 | Author: jackson | Hits:

[Driver Developfilesystemdriver

Description: 文件系统过滤驱动开发代码,可用于文件加密,保护硬盘数据的安全。-File system filter driver development code, can be used for file encryption to protect the hard disk data security.
Platform: | Size: 147456 | Author: jcq | Hits:

[Internet-NetworkUDP

Description: 用UDP实现可靠文件传输 大家都清楚,如果用TCP传输文件的话,是很简单的,根本都不用操心会丢包,除非是网络坏了,就得重来。用UDP的话,因为UDP是不可靠的,所以用它传输文件,要保证不丢包,就得我们自己写额外的代码来保障了-Use UDP to achieve a reliable file transfer we all know that if we use TCP to transfer files, it will be very simple, simply do not have to worry about will be packet loss, unless the network is broken, you must re. If using UDP, since UDP is unreliable, so use it to transfer files, it is necessary to ensure that packet loss, you must write our own extra code to protect the
Platform: | Size: 10240 | Author: mywk | Hits:

[Otherfileprotection

Description: Protect files by keeping them open. No body can delete or access those file while they are open exclusively
Platform: | Size: 202752 | Author: f1 | Hits:

[OS programhacker

Description: HACKING SECRETS REVEALED How To protect Yourself Firewalls Antivirus Software Tips & Tricks Protecting Shared Resources Disabling File and Printer Sharing Oh No My system s Infected Chapter 4 Who are Hackers Anarchist Hackers Hackers Crackers 24 24 25 26 Chapter 8 Every Systems Greatest Flaw Chapter 9 How to Report Hackers 65 60 Chapter 5 Tools of the Trade Portscanners 27 28 Chapter 10 Final Words 74- HACKING SECRETS REVEALED How To protect Yourself Firewalls Antivirus Software Tips & Tricks Protecting Shared Resources Disabling File and Printer Sharing Oh No My system s Infected Chapter 4 Who are Hackers Anarchist Hackers Hackers Crackers 24 24 25 26 Chapter 8 Every Systems Greatest Flaw Chapter 9 How to Report Hackers 65 60 Chapter 5 Tools of the Trade Portscanners 27 28 Chapter 10 Final Words 74
Platform: | Size: 449536 | Author: benny | Hits:

[Windows Developrainhips2.06Src

Description: 禹盾hips是一个完全免费且开放源代码的主机入侵防御系统,利用禹盾hips可以保护您的系统免受病毒入侵。他是一种能监控你电脑中文件的运行和文件运用了其他的文件以及文件对注册表的修改,并向你报告请求允许的的软件。如果你阻止了,那么它将无法运行或者更改。比如你双击了一个病毒程序,HIPS软件跳出来报告而你阻止了,那么病毒还是没有运行的。引用一句话:”病毒天天变种天天出新,使得杀软可能跟不上病毒的脚步,而HIPS能解决这些问题。”。 HIPS是以后系统安全发展的一种趋势,只要你有足够的专业水平,你可以只用HIPS而不需杀毒软件。但是HIPS并不能称为防火墙,最多只能叫做系统防火墙,它不能阻止网络上其他计算机对你计算机的攻击行为。-Yu hips Shield is a completely free and open source host intrusion defense systems, the use of hips Yu shield to protect your system from viruses. He is a computer you can monitor the operation and file documents the use of the documents and other files on the registry changes, and requested permission to report to you the software. If you stop, then it will be unable to run or change. For example, you double-click on a virus program, HIPS software to report and you jump out of a block, then run the virus or not. Quoted saying: "HIV every day, every day a new variant, the soft-kill virus could not keep up the pace, and HIPS can solve these problems.". HIPS is a system security after the development of a trend, as long as you have sufficient professional level, you can only HIPS without antivirus software. However, HIPS and firewall can not be called up to the system can only be called a firewall, it can not prevent other computer network attacks on your computer.
Platform: | Size: 1290240 | Author: zzage | Hits:

[Crack Hackdirsh

Description: 文件夹加密工具(开源代码) 软件作者:dyforc 发现文件夹加密的软件较少,而且都不大适合我用,所以写了一个。主要是对指定文件夹和其子目录下所有文件加密。 用到的加密算发是RC4。 本程序特色: 1. 可以指定加密长度(即只对文件的一部分进行加密),(对大文件加密很有用) 2. 可以随机生成动态密钥 (即使加密目录下某个文件的加密密钥被破解了,不影响目录下其他加密过的文件,因为每个文件加密密钥不同,都由输入的密钥随机计算产生) 3. 可以随机化文件名,对文件生成MD5,以此来保障解密成功。 4. 加解密过程中程序允许执行指定脚本。-Folder encryption tool (open source code) Software Author: dyforc Found the software folder encryption less, but I do not fit, so to write one. Is the designated folder and all its subdirectories file encryption. Calculation made use of encryption is RC4. This procedure features: 1. Can specify the encryption length (that is, only part of the document encryption), (large file encryption useful) 2. Can be randomly generated dynamic key (Even if encrypted a file directory of the encryption key being cracked, the directory does not affect other encrypted files, because a different encryption key for each document, by the calculation of input generate a random key) 3. Of file name can be random, the document to generate MD5, in order to protect the successful decryption. 4. The process of encryption and decryption process to allow the implementation of the specified script.
Platform: | Size: 74752 | Author: 噶噶 | Hits:

[File Operatefolderlock

Description: This VB program to lock and protect folder in windows directory
Platform: | Size: 2048 | Author: HERY TAUFIK | Hits:

[Windows Developat4re_protector_v1.0

Description: Exe文件保护DELPHI源代码,可保护EXE文件-Exe File Protection DELPHI source code, protect EXE files
Platform: | Size: 17408 | Author: raoyun | Hits:

[Crack Hackfileprotection

Description: (这是别人写的)加密码实现文件保护,免安装,C++源码-enter the password so that you can protect your file
Platform: | Size: 232448 | Author: 一一 | Hits:

[File OperateProtect

Description: Protect executable file
Platform: | Size: 4096 | Author: Laurentiu | Hits:

[Windows Developtry

Description: NT式驱动实现的文件保护功能,包括文件隐藏,防删除、打开、读写功能不是很好-file protect
Platform: | Size: 238592 | Author: 梁培艳 | Hits:

[Disk ToolsAod

Description: > 支持2000 xp 2003 vista win7 > 不在磁盘上产生任何临时文件 > 超优化的算法,在保护的情况下,操作硬盘,跟没有保护的情况下,速度一样, 不伤硬盘 > 模拟硬件还原卡工作原理,稳定快速 > 密码保护,用户登录后可以任意配置还原选项 > 支持只保护系统盘,和全盘保护, 支持多硬盘 > 保护MBR,加入防机器狗模块,用户可以手头关闭拦截第三方驱动的功能,比如用来完一些带驱动保护的游戏(以后改成白名单) > 所有功能,集成到一个驱动文件里,全绿色免安装,一共一个文件 > 界面简洁,操作方便,没任何副作用,呵呵, 我诚认界面是学习迅闪的,以前用习惯它了,不过它不防狗 > 更改了下算法,应付内存特别小的情况 V1.3 > 当然,以上介绍有部分夸大之词 -> Support 2000 xp 2003 vista win7 > Do not have any temporary files on disk > Super optimized algorithm, in the case of protection, the operation hard drive, with no protection case, the same speed, not to hurt the hard drive > Analog hardware card works to restore stability quickly > Password protection, user login can restore any configuration options > Support only protect the system tray, and overall protection, support for multiple hard drives > Protect the MBR, joined the anti-robot module, the user can block third-party-driven hand turn off features like belt drive for complete protection of some games (later changed to white list) > All functions integrated into a driver file, the whole green-free installation, a total of a file > Interface is simple, easy, no any side effects, huh, huh, I sincerely believe is learning fast Flash interface, and with a habit of it before, but it is not anti-dog > Changed the algorithm to cope with the situa
Platform: | Size: 433152 | Author: zhangjinxu | Hits:

[File Operatefile-monitoring

Description: 可以监视,用户在文件操作记录,读写,对保密文件进行保护-protect file
Platform: | Size: 5120 | Author: xie | Hits:

[Windows Developprotect

Description: 监控准备运行的可执行文件。由用户决定是不是让它运行-Monitor ready to run the executable file. Determined by the user running it is not
Platform: | Size: 16384 | Author: 石林 | Hits:

[Crack HackWin32API-Protocket-File

Description: 在程序开发过程中,经常遇到需要保护用户信息和私有数据不被他人窃取的情况,也就是要对数据进行加密。 在Win2000以前,要对数据进行加密和解密操作,一般要使用CryptAPI函数,相当烦琐。幸运的是,从Win2000 开始,操作系统从内核的级别上提供了对文件进行加密和解密的函数,而且使用起来相当简单。 -In the program development process, often encounter the need to protect user information and private data from being stolen by others, the situation, that is to encrypt the data. In Win2000 before, to the data encryption and decryption operations, generally use CryptAPI function, quite cumbersome. Fortunately, starting from the Win2000 operating system from the kernel level provides file encryption and decryption functions, but also fairly simple to use.
Platform: | Size: 1024 | Author: lr | Hits:

[File OperateFile

Description: 设计目的:通过设计和调试一个简单的文件系统,主要是模拟文件操作命令的执行,来模拟文件管理,使学生对主要文件操作命令的实质和执行过程有比较深入的了解,掌握它们的基本实施方法。 设计要求: ⑴设计一个支持n个用户的文件系统,每个用户可拥有多个文件; ⑵采用二级或二级以上的多级文件目录管理; ⑶对文件应设置存取控制保护方式,如“只能执行”、“允许读”、“允许写”等; ⑷系统的外部特征应接近于真实系统,可设置下述文件操作命令:建立文件、打开文件、关闭文件、删除文件、读文件、写文件、复制文件、查询目录。 ⑸通过键盘(或鼠标)使用该文件系统,系统应显示操作命令的执行结果。 -Design Objective: To design and debug a simple file system, mainly the implementation of the simulation file manipulation commands, to simulate the file manager, so that students have a more in-depth understanding of the substance and the implementation process of the main file manipulation commands to master their basic implementationapproach. Design requirements: The ⑴ design a file system supports n users, each user can have multiple files ⑵ two multi-level or two above the file directory management (3) the file should be set up access control to protect only the implementation, "allowed to read," Allow Write " ⑷ the external characteristics of the system should be close to the real system, file manipulation commands can be set to the following: creating a document, open the file, close the file, delete files, read files, write files, copy files, query the directory. ⑸ use the file system via the keyboard (or mouse), the system should display the results of the implementati
Platform: | Size: 2048 | Author: 梁程广 | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net