Welcome![Sign In][Sign Up]
Location:
Search - find byte

Search list

[Crack HackEncryDeCry

Description: 我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。 这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
Platform: | Size: 1553 | Author: 伍孝秉 | Hits:

[Other resourcejop_core_bcfetch

Description: JOP内核字节码获取,很难找的东东,呕血之作-JOP core byte code access, it is difficult to find the price. Zhi for hematemesis
Platform: | Size: 2569 | Author: 黄肖超 | Hits:

[Anti-virusDeleteVirus

Description: 单杀病毒模版,查找特定扩展名的文件,搜索特征字节,建立文件列表,并删除 适用于快速传播的单体病毒,只要修改特征字节即可-single template kill the virus, to find out specific extension of the document, search features bytes, document links, and delete applied to the rapid spread of the virus monomer, as long as the changes will feature byte
Platform: | Size: 3839 | Author: zhaowei | Hits:

[OtherMemeryAnalysis2.1

Description: 对任意进程的内存数据进行分析、编辑的工具。全局内存操作;支持8种(字节、整数、长整数、单精度、双精度、货币、单字节字符、双字节字符)数据类型读写、搜索和查找;各数据间相互转换;可逆修改;即时查看和可抓取3个内存快照进行查找、对比或联合查找;也可查找连贯的一组数据;数据重复搜索;监视内存数据;保存和加载找查、搜索、监视和快照的内容;即时获取内存结构等功能,是制作外挂和破解软件的有力工具,也可以当作游戏修改器用。内存数据是电脑里很重要的部份,而且没有帮助,适合有内存方面基础的电脑玩家使用。 -right arbitrary process memory data analysis, editing tools. Global memory operation; Support eight species (byte, integer, long integer, single-precision and double precision, currency, single-byte characters, double byte characters) read and write data type, search and retrieval; among the data conversion; Irreversible changes; View and immediately grasp three Snapshot for you, contrast or joint search; may also find a consistent set of data; Search data duplication; Memory surveillance data; Loading for the preservation and investigation, search, surveillance and snapshots of content; immediate access memory structure function is to produce store and break the powerful software tools, can also change as the game makes use of. Memory is a computer data a very important part, but no help
Platform: | Size: 174003 | Author: ZhanK | Hits:

[assembly languageget_max_min

Description: 设从DATA开始的字节单元存入10个无符号数据,找出该组数据中的最大值和最小值,在屏幕上分别显示这10个数据和最大值、最小值。-established from the beginning byte DATA modules into 10 unsigned data, the data to find the maximum and minimum, the screens showed that 10 data and maximum and the minimum.
Platform: | Size: 1184 | Author: 赵伟 | Hits:

[TCP/IP stackJBSocketServerTestSource

Description: Testing TCP and UDP socket servers using C# and .NETWhen you re developing a TCP/IP server application it s easy to test it poorly. It s easy to fire requests into a server, check the responses and assume that s enough. Even if you re testing using the actual production client application you may find that you are failing to fully test the server under heavy load or unusual network conditions. You may be using two or more machines, but your development network probably doesn t cause the kind of packet fragmentation and delays that you might encounter in the wild. Often when testing in the development environment your server only ever receives complete, distinct messages, and this can lead novice developers to assume that this is how it always is. As we pointed out in a previous article, the server developer is always responsible for breaking up the TCP byte stream into protocol specific chunks.
Platform: | Size: 111143 | Author: 王小文 | Hits:

[DocumentsPCI BIOS SPECIFICATION

Description: 1. Introduction ............................................................................................................... 1 1.1. Purpose ....................................................................................................... 1 1.2. Scope .......................................................................................................... 1 1.3. Related Documents..................................................................................... 1 1.4. Terms and Abbreviations ........................................................................... 1 2. Functional Description .............................................................................................. 2 3. Assumptions and Constraints .................................................................................... 3 3.1. ROM BIOS Location.................................................................................. 3 3.2. Calling Conventions................................................................................... 3 3.3. BIOS32 Service Directory.......................................................................... 4 3.3.1. Determining the existence of BIOS32 Service Directory............ 4 3.3.2. Calling Interface for BIOS32 Service Directory ......................... 5 3.4. PCI BIOS 32-bit service............................................................................. 6 4. Host Interface ............................................................................................................ 7 4.1. Identifying PCI Resources.......................................................................... 7 4.1.1. PCI BIOS Present ........................................................................ 7 4.1.2. Find PCI Device .......................................................................... 9 4.1.3. Find PCI Class Code ................................................................... 10 4.2. PCI Support Functions ............................................................................... 11 4.2.1. Generate Special Cycle................................................................ 11 4.2.2. Get PCI Interrupt Routing Options.............................................. 12 4.2.3. Set PCI Hardware Interrupt ......................................................... 15 4.3. Accessing Configuration Space.................................................................. 17 4.3.1. Read Configuration Byte ............................................................. 17 4.3.2. Read Configuration Word ........................................................... 18 4.3.3. Read Configuration Dword ......................................................... 19 4.3.4. Write Configuration Byte ............................................................ 20 4.3.5. Write Configuration Word .......................................................... 21 4.3.6. Write Configuration Dword ........................................................ 22 APPENDIX A: Function List......................................................................................... 23 APPENDIX B: Return Code List ................................................................................... 24
Platform: | Size: 55157 | Author: zoufei_008@163.com | Hits:

[assembly languageget_max_min

Description: 设从DATA开始的字节单元存入10个无符号数据,找出该组数据中的最大值和最小值,在屏幕上分别显示这10个数据和最大值、最小值。-established from the beginning byte DATA modules into 10 unsigned data, the data to find the maximum and minimum, the screens showed that 10 data and maximum and the minimum.
Platform: | Size: 1024 | Author: 赵伟 | Hits:

[TCP/IP stackJBSocketServerTestSource

Description: Testing TCP and UDP socket servers using C# and .NETWhen you re developing a TCP/IP server application it s easy to test it poorly. It s easy to fire requests into a server, check the responses and assume that s enough. Even if you re testing using the actual production client application you may find that you are failing to fully test the server under heavy load or unusual network conditions. You may be using two or more machines, but your development network probably doesn t cause the kind of packet fragmentation and delays that you might encounter in the wild. Often when testing in the development environment your server only ever receives complete, distinct messages, and this can lead novice developers to assume that this is how it always is. As we pointed out in a previous article, the server developer is always responsible for breaking up the TCP byte stream into protocol specific chunks.
Platform: | Size: 110592 | Author: 王小文 | Hits:

[Crack HackEncryDeCry

Description: 我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。 这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
Platform: | Size: 1024 | Author: 伍孝秉 | Hits:

[VHDL-FPGA-Verilogjop_core_bcfetch

Description: JOP内核字节码获取,很难找的东东,呕血之作-JOP core byte code access, it is difficult to find the price. Zhi for hematemesis
Platform: | Size: 2048 | Author: 黄肖超 | Hits:

[Anti-virusDeleteVirus

Description: 单杀病毒模版,查找特定扩展名的文件,搜索特征字节,建立文件列表,并删除 适用于快速传播的单体病毒,只要修改特征字节即可-single template kill the virus, to find out specific extension of the document, search features bytes, document links, and delete applied to the rapid spread of the virus monomer, as long as the changes will feature byte
Platform: | Size: 3072 | Author: | Hits:

[assembly languageupload

Description: 汇编程序中的数制转换与DOS调用功能的结合,还有一个表处理程序,以下是程序实现的功能: 1.从键盘输入一个十进制数,转换为二进制显示在屏幕上; 2.输入十位BCD码,转换为4字节十六进制显示; 3.从键盘输入两个十进制数,相加后将结果显示在屏幕上; 4.从键盘键入一个4位十六进制数,转换为十进制显示在屏幕上; 5.对一个已知长度的从小到大的无符号字节数组查找关键字;用二分法实现-Compilation process several conversion and DOS system calls the combination of features, as well as treatment procedures for a table, the following is the procedure to achieve the functions of: 1. From the keyboard input of a decimal number converted to binary display on the screen 2. The importation of 10 BCD code, converted to 4-byte hexadecimal display 3. from the keyboard input of two decimal number, add up the results will be displayed on the screen 4. from the keyboard type a hexadecimal number 4, is converted to Decimal display on the screen 5. of a known length from small to large unsigned byte array to find keywords realize with the dichotomy
Platform: | Size: 3072 | Author: qcx | Hits:

[Internet-NetworkBreakPoint

Description: function app_path1:string function socket_rec_line1(socket1:TCustomWinSocket timeout1:integer crlf1:string=#13#10):string 实际上是我的一个公用单元中的函数,大家应该养成建立自己的公用单元的习惯。 socket_rec_line1函数中用了唐晓峰大侠的coolmail中的办法:只是简单的一个一个字节收取,找到结束 标志后就算收完一行了,大家实际应用时可能应该找更好的办法。-function app_path1: string function socket_rec_line1 (socket1: TCustomWinSocket timeout1: integer crlf1: string =# 13# 10): string is actually one of my common unit of function, we should develop a common unit to establish their own habits. socket_rec_line1 function used唐晓峰heroes in the coolmail approach: simply charge a one byte to find the sign after the end of his party even after the resumption, the practical application of U.S. may be looking for better alternatives.
Platform: | Size: 191488 | Author: 刘鸿翔 | Hits:

[Game Hook Crackunitrom

Description: 完美国际FB穿墙飞天外挂的源代码,基址是68-71的都可以用的一般三周换一次基址.以后基址改了.大家就自己换吧.注意,本程序基址用的二字节的,与平常网上找到的四字节数据有所不同.-Perfect international FB Flying through walls of the plug-in source code, the base is the site of 68-71 can be used in general for a base address for three weeks. After the base address changed. U.S. on its own for it. Note that this procedure base address used Second byte of the usual online to find the four-byte data is different.
Platform: | Size: 4096 | Author: chenqi | Hits:

[assembly languageASM_Sort

Description: 用汇编语言实现的:首先通过键盘输入一已知长度的字节数组,然后对该数组进行递增排序,并显示排序结果。最后再输入一数值,在该数组中进行查找。要求使用子程序结构。-Using assembly language to achieve: First of all, through the keyboard input of a known length of the byte array, and then increase the array to sort and display the results. Then enter a value in the array to find. Require the use of subroutine structure.
Platform: | Size: 10240 | Author: Tony Yau | Hits:

[Driver Developyuan

Description: //下面是画圆的程序, //画线、画圆、画各种曲线其实都很简单,归根到底就是x、y的二元方程嘛 //对算法感兴趣的话建议去找本《计算机图形学》看看,不是卖关子哦。实在是几句话说不清除,呵呵 // ---------------------------------------------- //字节 void circleDot(unsigned char x,unsigned char y,char xx,char yy)//内部函数,对称法画圆的8个镜像点 {//对称法画圆的8个镜像点 -//The following is a drawcircle procedures,// drawing line, circle, drawing a variety of curve is actually very simple, in the final analysis is the x, y of the dual equation嘛//of the proposed algorithm interested to find this computer graphics, look, rather than hedge Oh. It is not clear a few words, huh, huh//----------------------------------------------// byte void circleDot (unsigned char x, unsigned char y, char xx, char yy)// internal function, Symmetry drawcircle mirror points of the 8 (//Symmetry drawcircle the 8 image points
Platform: | Size: 5120 | Author: 刘少 | Hits:

[Software Engineeringmp3addin

Description: 通过 TopByteLabs 公司开发的 MP3 AddIn,您就可以不必转换格式而直接把 MP3 文件插入PowerPoint 演示文稿中。 MP3 AddIn 在后台修改 MP3 文件的头部并自动重命名该音频文件,从而使得 PowerPoint “认为” 这就是一个 WAV 文件。这样做最大的好处是文件大小几乎不变。新生成的 WAV 文件只比原来的 MP3 文件增大了两个字节。而真正的文件格式转换会导致音频文件大小的急剧增加。利用 MP3 Addin 你仍然可以享受到 MP3 文件的高品质,并且你再也不需要记着把你的 MP3 文件和演示文稿一起打包发送或移动以防止演示时找不到声音文件。-通过TopByteLabs developed MP3 AddIn, you can convert the format do not have to put MP3 files directly inserted into PowerPoint presentation. MP3 AddIn modify MP3 files in the background of the head and automatically rename the audio file, making PowerPoint " think" This is a WAV file. The biggest advantage of doing so file sizes are almost unchanged. New WAV files generated only MP3 file than the original two-byte increase. True file format conversion would cause the size of audio files is increasing dramatically. The use of MP3 Addin you can still enjoy high-quality MP3 files, and you no longer need to remember you put the MP3 files and presentation package together to send or move to prevent the demonstration can not find sound files.
Platform: | Size: 867328 | Author: 孔令栋 | Hits:

[Software Engineeringc

Description: *** *** *** * 程序功能简介 个人财政支出管理程序,完成收入,支出,盈余的记录和管理。 课程设计要求 (1) 增加函数,完成财政账目的管理功能。 (2) 将所有的函数与相应的数据封装到类中,并改写主程序,使程序简化。 (3) 可自行增加程序的功能。 (4) 设计测试主程序,在主程序中完成测试。 课程设计说明 (1) SetGoal()函数账目中有问题,改正。 (2) 可将整修记录装入一个字符串,在两条记录间用特殊符号隔开。 (3) 查找相应记录时,可采用逐个字节比较的方法。-About******************* program features personal financial expenditure management procedures, the completion of income, expenditure, surplus and management of records. Curriculum design requirements (1) increase in function, the completion of the financial accounts of the management functions. (2) all the function and corresponding to the type of data encapsulation, and to rewrite the main program to simplify and streamline the procedures. (3) can increase the function of the procedure. (4) the design of test main program, completed the test in the main program. Curriculum design that (1) SetGoal () function of the accounts in question and correct. (2) can be renovated into a string record, recorded in between the two separated by special symbols. (3) Find the appropriate records, can be by-byte comparison.
Platform: | Size: 3072 | Author: gao | Hits:

[SCMMYLIB

Description: 常用C语言库,包含字符转数字,查找字节流,日期转换.- Commonly used C language library, including characters to digital, to find byte stream, date conversion
Platform: | Size: 10240 | Author: cziyo | Hits:
« 12 3 »

CodeBus www.codebus.net