Welcome![Sign In][Sign Up]
Location:
Search - hide and seek

Search list

[Firewall-Securityhdsk41

Description: hide and seek 可以在GIF图像中嵌入数据。-hide and seek in the GIF image embedded data.
Platform: | Size: 214338 | Author: 杨琴 | Hits:

[Firewall-Securityhdsk41

Description: hide and seek 可以在GIF图像中嵌入数据。-hide and seek in the GIF image embedded data.
Platform: | Size: 214016 | Author: 杨琴 | Hits:

[Crack HackHide_and_Seek_v4.1

Description: Hide and Seek v 4.1 数字隐藏工具-Hide and Seek v 4.1
Platform: | Size: 192512 | Author: 往年 | Hits:

[WEB CodephpreliazeRSA

Description: PHP实现RSA算法/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */ -/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS#1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */
Platform: | Size: 6144 | Author: gg | Hits:

[Linux-Unixjphs-0.3

Description: 经典的在Unix下的信息隐藏之一! 主要是对jpg图片进行隐藏~-Hide and Seek for Linux These two programs let you hide a file in a jpeg file and then let you recover it later.
Platform: | Size: 17408 | Author: ly | Hits:

[Crack HackSteganography

Description: 2003年IEEE的一篇综述文章,对了解其基本状况有一定帮助 Hide and Seek: An Introduction to Steganography-Hide and Seek: An Introduction to Steganography
Platform: | Size: 901120 | Author: ly | Hits:

[JSP/Javaq5_2

Description: 2) 设计编写一捉迷藏游戏:当用户鼠标靠近目标圆时,圆圈跑出鼠标捕捉点。 提示:先画出一个圆,监听鼠标移动事件,鼠标进入圈内,则删除该圆,在原有范围外,重新画一个同样大小的圆。 -2) prepare a hide and seek game design: When a user mouse close to the target circle, the circle ran the mouse capture point. Hint: Draw a circle, listen mouse events, mouse enters the circle, then remove the circle, outside the scope of the original and re-draw a circle the same size.
Platform: | Size: 1024 | Author: cui fan | Hits:

[JSP/JavaGameApplet

Description: 6) 设计编写一捉迷藏游戏:当用户鼠标靠近目标圆时,圆圈跑出鼠标捕捉点。 提示:先画出一个圆,监听鼠标移动事件,鼠标进入圈内,则删除该圆,在原有范围外,重新画一个同样大小的圆。 -6) Design prepared a hide and seek game: When a user mouse close to the target circle, the circle ran the mouse capture point. Hint: Draw a circle, listen mouse events, mouse enters the circle, then remove the circle, outside the scope of the original and re-draw a circle the same size.
Platform: | Size: 1024 | Author: 罗立志 | Hits:

[Game ProgramZhuomicang

Description: 用java实现捉迷藏小游戏,当用户鼠标靠近目标圆时,圆圈跑出鼠标捕捉点。 提示:先画出一个圆,监听鼠标移动事件,鼠标进入圈内,则删除该圆,在原有范围外,重新画一个同样大小的圆。 -Hide and seek game using java, when users mouse close to the target circle, the circle ran the mouse capture point. Hint: Draw a circle, listen mouse events, mouse enters the circle, then remove the circle, outside the scope of the original and re-draw a circle the same size.
Platform: | Size: 1024 | Author: 王栋 | Hits:

[CA authhdsk41

Description: hide&seek可运行文件,经过个人测试运行正常。可将秘密文件隐写到指定图片中,并可检测隐写信息。-hide &seek to run the file through individual test run normally. Hidden secret documents can be written to the specified picture, and can detect steganographic message.
Platform: | Size: 936960 | Author: 赵玲 | Hits:

[CA authHideseek_introduction

Description: Hideseek可将秘密文件隐写到指定图片中,并可检测隐写信息,本文是对该软件的使用说明。-hide &seek to run the file through individual test run normally. Hidden secret documents can be written to the specified picture, and can detect steganographic message.
Platform: | Size: 257024 | Author: 赵玲 | Hits:

[JSP/JavaFluVille

Description: 一款类似与捉迷藏的游戏,敬请的下载吧,你可以学习到很多你想不到的东西-A similar game of hide and seek, please download it
Platform: | Size: 1163264 | Author: pm | Hits:

[Otherwumpus-6-names

Description: Hunt the Wumpus是一个很重要的早期电脑游戏。他是基于一个简单的隐藏/搜索的形式,有一个神秘的怪兽(Wumpus),潜行在房间的网络中。玩家可以使用基于命令行的文字界面,通过输入指令来在房间中移动,或者沿着几个相邻的房间中的弯曲的路径射箭。其中有20个房间,每个房间与另外三个相连接,排列像一个dodecahedron的顶点(或者是一个icosahedron的面)。可能的危险有:,超级蝙蝠(它会把玩家扔到任意的位置)和Wumpus。当玩家从提示中推断出Wumpus所在的房间而不进入,并向房间内射入一支箭来杀死他。然而,如果射错了房间就会惊动Wumpus,他就会吞噬玩家。-Hunt the Wumpus is an early video game, based on a simple hide and seek format featuring a mysterious monster (the Wumpus) that lurks deep inside a network of rooms. It was originally a text-based game written in BASIC. It has since been ported to various programming languages and platforms including graphical versions.
Platform: | Size: 2048 | Author: | Hits:

CodeBus www.codebus.net