Welcome![Sign In][Sign Up]
Location:
Search - protection delphi

Search list

[Windows Develop实例45 文件的锁定保护

Description: 文件的锁定保护的例子-document lock the example of the protection
Platform: | Size: 193536 | Author: 冰冰 | Hits:

[OpenGL programboids

Description: Delphi + OpenGL 一个类似3D水族箱屏幕保护的例子,主要是演示OPENGL随机、多线程技术及多层贴图的应用。-Delphi+ OpenGL 3D aquarium a screen similar to the example of the protection is mainly demonstration OpenGL randomized, multi-threading and multi-storey mapping applications.
Platform: | Size: 662528 | Author: 张震沣 | Hits:

[ADO-ODBC环保数据监测处理系统 

Description: 环保数据监测处理系统,系统的安装说明在压缩文件中-Environment protection monitor processing system. System installation guide is in compression documents.
Platform: | Size: 2262016 | Author: 陈友洪 | Hits:

[OS program读取CPU序列号

Description: 读取cpu的序列号和名称,用与对文件的保护处理等.包含源代码for delphi-cpu read the serial numbers and names, and with the protection of the document processing. Included source code for delphi
Platform: | Size: 178176 | Author: 录音 | Hits:

[OtherEXE文件加密器1.84

Description: 让运行的exe都加一个密码保护. 对你的隐私很好的保护. -run exe were to a password-protected. To your good privacy protection.
Platform: | Size: 350208 | Author: wolf | Hits:

[Driver Develophdbh

Description: 硬盘保护程序。对数据进行保留。和国内的还原卡一样的功能。-drive protection program. The data retention. And the reduction of domestic cards the same capabilities.
Platform: | Size: 244736 | Author: yuyang | Hits:

[WEB CodeDelphidestroymyself

Description: Delphi的自毁程序。在您程序中加入该程序段,当附合条件后,该程序可以自已毁了自已。可以实现程序的自我保护。-destruction procedures. In your process of joining the program, with conditions attached, the procedures themselves can destroy themselves. The procedure can achieve self-protection.
Platform: | Size: 1024 | Author: 刘立 | Hits:

[File OperateFProtect

Description: 文件夹卫士,保护你的文件夹不被非法操作, 可以任意添加文件夹,或取掉不需保护的文件夹.-folder guard, protect your folder is not illegal operation, you can add arbitrary folder, profusely without protection or the folder.
Platform: | Size: 593920 | Author: 2386869 | Hits:

[Firewall-SecurityARP-bind.RAR

Description: 利用Internet Protocol Helper API interface结口开发的一个arp保护工具. 开发工具:delphi7-The use of Internet Protocol Helper API interface I developed a knot arp protection tool. Development tools: delphi7
Platform: | Size: 236544 | Author: 张三 | Hits:

[Crack HackDelphi

Description: 软件加密保护,硬加密方案。 USB加密锁示例Delphi代码。-Encryption software protection, hardware encryption scheme. USB encryption locks Delphi sample code.
Platform: | Size: 62464 | Author: awaker | Hits:

[Linux-Unixredhat9

Description: 本书是红帽Linux 9的完整指南。无论把Linux作为服务器还是桌面操作系统,本书都提供了安装、配置与管理最新操作系统的实用信息。本书介绍的内容包括Linux安装,命令行界面,Linux系统管理与配置,诊断引导过程,内核重新编译,使用GNOME与KDE,了解基本TCP/IP网络,保护Linux防火墙,设置安全远程访问,安装和测试DNS、DHCP、CUPS与sendmail,配置和查错FTP、NFS、Samba与Apache,另外还介绍了Linux认证的要求。本书适合于有兴趣学习红帽Linux的各层次读者。-This book is Red Hat Linux 9 complete guide. Regardless of the Linux as a server or desktop operating system, this book has been providing installation, configuration and management of practical information on the latest operating system. Described in this book include the Linux installation, command-line interface, Linux system administration and configuration, diagnosis and guide the process, the kernel re-compile, use GNOME and KDE, to understand the basic TCP/IP network, the protection of Linux firewall, set up secure remote access, installation and testing of DNS, DHCP, CUPS with sendmail, configuration and error checking FTP, NFS, Samba and Apache, also introduced a Linux certification requirements. This book is suitable for Red Hat Linux are interested in learning at all levels of readers.
Platform: | Size: 44752896 | Author: 西仁 | Hits:

[Delphi VCLdelphi_reg_mon

Description: 通过注册监控函数,对目录的变动进行监控。需要对自有文件保护的可以参考-Registered monitoring function, to monitor directory changes. The need for the protection of its own documents can refer to
Platform: | Size: 14336 | Author: coffee | Hits:

[Delphi/CppBuilderiori55_weiny_v1.0

Description: 很好的文章,用于共享软件的注册保护.文章从调用注册流程、验证注册密钥、存储注册验证结果三个方面举例说明了软件正确的注册验证方式,指出了大多数共享软件作者在注册验证代码的编写中常犯的错误,灵活运用文章中的方法,可以最大限度的增加破解工作者的工作量,从而为自己争取更多的正版存活时间-Very good article, for sharing the registration of software protection. Article from the call registration process, verify the registration keys, storage for registration to verify the results of three examples to illustrate the registration of the software to verify the correct way, pointing out that the majority of shareware authors registration verification code in the preparation of the mistakes often, flexible way to use the article, you can minimize the increase in workload to crack, so as to fight for their survival time of more genuine
Platform: | Size: 273408 | Author: 绝对零度 | Hits:

[Hook apineicunbaoh

Description: 修改内存保护的对写外挂有帮助!修改内存保护的对写外挂有帮助!-Modify the memory protection will help to write plug-ins! Modify the memory protection will help to write plug-ins!
Platform: | Size: 8192 | Author: 水月 | Hits:

[OtherDelphi

Description: 利用花指令扰乱Cracker,以达到保护软件的作用。 本工具可以自定义花指令,有三种模式,如下: 1、随机插入花指令 2、指定插入固定的花指令 3、全部插入花指令 使用方法: 1、请自行在 JunkData.mdb 数据库中添加花指令 2、在您要放花指令的地方写:{$F Junk} 3、{$F Junk} 为花指令标记 4、用本工具处理后,重新编译即可。-Disrupt the use of junk code Cracker, in order to achieve the role of protection software. This tool can customize the junk code, there are three modes, as follows: 1, randomly insert junk code 2, the designated fixed insert junk code 3, the full insert junk code to use: 1, your own database in JunkData.mdb add junk code 2, in the command you want to put flowers where to write: ($ F Junk) 3, ($ F Junk) tag for flower orders 4, after treatment with this tool, you can re-compile.
Platform: | Size: 711680 | Author: 长毛 | Hits:

[Delphi VCLdelphi

Description: :随着计算机控制网络的迅速发展,串口通讯得到了广泛应用。文章针对在电站微机保护中碰到的串口通讯问题,提供了3种基于Delphi的串口通讯解决方法。-: With the computer-controlled networks, the rapid development of serial communication has been widely applied. Based on microprocessor-based protection in the power station they encountered in serial communication problems, provides three kinds of serial communication based on the Delphi solution.
Platform: | Size: 129024 | Author: 周炜 | Hits:

[OS programlicheng

Description: 到得CPU序列号、网卡MAC地址、注册码保护例子。 希望对大家有用-To a CPU serial number, the network card MAC address, examples of key protection. I hope all of you a useful
Platform: | Size: 1009664 | Author: xinchangkk | Hits:

[Windows Developat4re_protector_v1.0

Description: Exe文件保护DELPHI源代码,可保护EXE文件-Exe File Protection DELPHI source code, protect EXE files
Platform: | Size: 17408 | Author: raoyun | Hits:

[Delphi VCLMachineID.v1.0.For.Delphi

Description: MachineID Protection for Delphi & C++ Builder Copyright ?2003 Ionworx Technology All Rights Reserved www.ionworx.com support@ionworx.com Last Update: 21, March 2003- MachineID Protection for Delphi & C++ Builder Copyright ?2003 Ionworx Technology All Rights Reserved www.ionworx.com support@ionworx.com Last Update: 21, March 2003
Platform: | Size: 289792 | Author: pc007 | Hits:

[Disk ToolsWFolder-Protector-Delphi-7

Description: Another way for Folder protection technique
Platform: | Size: 279552 | Author: mxnoname | Hits:
« 12 3 »

CodeBus www.codebus.net