Location:
Search - private
Search list
Description: 虚拟专用网的创建与实现-Virtual Private Network creation and implementation of
Platform: |
Size: 18706432 |
Author: 黄速核 |
Hits:
Description: 采用WINSOCK开发的聊天室源码,界面非常美观,可以私聊,管理员清屏,改昵称,踢人。发布系统公告-using Winsock development of the chat room source, the interface is very attractive, Private Chat, administrators-screen, change nickname, SAYS. Dissemination System Notice
Platform: |
Size: 527360 |
Author: ms-dos |
Hits:
Description: 虚拟专用网的创建与实现:本书系统介绍了虚拟专用网的概念、起源、配置、实现和维护,还对虚拟专用网体系结构、加密工具、有关限制、防火墙结构等内容进行了探讨,并提供了大量实例。本书是网络、MIS管理员必备的参考书。
-Virtual Private Network creation and realization : this book system introduced Virtual Private Network concept, the origin, distribution, implementation and maintenance, also Virtual Private Network Architecture, encryption tools, the restrictions, firewall structure on the content and provide a lot of examples. The book is network and MIS managers indispensable reference book.
Platform: |
Size: 18706432 |
Author: maha |
Hits:
Description: 仙境传说(RO)私人服务器端源代码.rar-Ragnarok Online (RO) private server-side source code. Rar
Platform: |
Size: 353280 |
Author: |
Hits:
Description: 虚拟专用网络可以实现不同网络的组件和资源之间的相互连接。
虚拟专用网络能够利用 Internet 或其它公共互联网络的基础设施为用
户创建隧道,并提供与专用网络一样的安全和功能保障。
-Virtual private network can realize the different network components and connections between resources. Virtual Private Network can take advantage of Internet or other public infrastructure of the Internet for users to create tunnels, and provide the same private network to protect the safety and functionality.
Platform: |
Size: 369664 |
Author: 雷震 |
Hits:
Description: 层次分析法计算程序,可进行分析评判,判断矩阵的构建,计算-AHP calculation procedure for analysis can be judged to determine Matrix Construction, calculation
Platform: |
Size: 4096 |
Author: gtigernj |
Hits:
Description: qt programming for linux
private part of the book -qt programming for linux private part of the book
Platform: |
Size: 159744 |
Author: 曹忠宇 |
Hits:
Description: Private Sub Form_Click()
Dim x, y, n As Integer
For x = 3 To 100
For y = 2 To x - 1
If x Mod y = 0 Then
Exit For
ElseIf y = x - 1 Then
If n Mod 10 = 0 Then Print
Form1.Print x " "
n = n + 1
End If
Next y
Next x
End Sub -Private Sub Form_Click()
Dim x, y, n As Integer
For x = 3 To 100
For y = 2 To x- 1
If x Mod y = 0 Then
Exit For
ElseIf y = x- 1 Then
If n Mod 10 = 0 Then Print
Form1.Print x " "
n = n+ 1
End If
Next y
Next x
End Sub
Platform: |
Size: 6907904 |
Author: 匿名 |
Hits:
Description: private virtual network dynamic
Platform: |
Size: 219136 |
Author: koernia |
Hits:
Description: 实用数字签名的步骤
(1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要
(2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方;
(3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature
(1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest
(2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together
(3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: |
Size: 23552 |
Author: 张云 |
Hits:
Description: 本书系统介绍了虚拟专用网的概念、起源、配置、实现和维护,还对虚拟专用网体系结构、加密工具、有关限制、防火墙结构等内容进行了探讨,并提供了大量实例。本书是网络、MIS管理员必备的参考书。 -System, this book introduces the concept of virtual private network, the origin, configuration, implementation, and maintenance, but also on the virtual private network architecture, encryption tools, the restrictions on the content of the firewall structure was discussed and to provide a large number of examples. This book is the network, MIS managers must have reference book.
Platform: |
Size: 18705408 |
Author: 李东海 |
Hits:
Description: 一个基于社交网络的P2P VPN 软件。-This is a free and open-source P2P Social Virtual Private Network (VPN) .
Platform: |
Size: 2514944 |
Author: Ying LI |
Hits:
Description: RSA encryption using private key and RSA decryption using public key. c sharp implementation.
Platform: |
Size: 81920 |
Author: mysteriousbangalor |
Hits:
Description: 网络聊天室 GUI 群聊 私聊 踢出用户 拥有语音聊天 和网络传输模块-Internet chat rooms chat private chat group kicked out of GUI users have voice chat and network transmission module
Platform: |
Size: 54272 |
Author: 杨毅 |
Hits:
Description: 完成基于公钥证书的非对称密钥分配工作
说明:
(1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。
(2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。
(3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;-Complete the asymmetric public key certificate-based key distribution work
Description:
(1) as the communication of both A and B, have a common trusted third party CA, the CA generates a public key certificate for each person and the corresponding private key and distributed to A, B.
(2) A and B respectively to provide their own public key certificates to each other both in the local verify the reliability of each other s public key certificate (assuming A, B has received CA s public key), then A with B s public key encryption 1 the data X (integer, can be their own definition, such as 100) and send it to B, B with their own private key decrypted by the data X, and then consult a good function by F (eg F (X) = 2* X) calculated F (X), then encrypted using A s public key sent to A A locally with their own private key to decrypt obtained F (x), calculated with the local F (X) are compared, if the same description Successful public-key distribution.
(3) A with B s public key on an
Platform: |
Size: 71680 |
Author: 熊龙生 |
Hits:
Description: VB设计私有动态IP经典代码Dynamic IP design classic VB code Private
-Dynamic IP design classic VB code Private
Platform: |
Size: 544768 |
Author: x |
Hits:
Description: VC编程设计Public And Private代码Public And Private VC Programming Code
-Public And Private VC Programming Code
Platform: |
Size: 11264 |
Author: 再问 |
Hits:
Description: 鸟哥的Linux私房菜—基础篇上。鸟哥的linux教程,不用多说了,用过的都知道好不好。pdf版本的-Brother Bird Linux private kitchens- on the basis of articles. Brother Bird linux tutorial, Needless to say, used all know is good. pdf version
Platform: |
Size: 6100992 |
Author: baikaishui |
Hits:
Description: crux crypter private edition
Platform: |
Size: 176128 |
Author: jes |
Hits:
Description: private key scanner to get free btc
Platform: |
Size: 207872 |
Author: gaara3 |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»