Description: Delphi + OpenGL 一个类似3D水族箱屏幕保护的例子,主要是演示OPENGL随机、多线程技术及多层贴图的应用。-Delphi+ OpenGL 3D aquarium a screen similar to the example of the protection is mainly demonstration OpenGL randomized, multi-threading and multi-storey mapping applications. Platform: |
Size: 662528 |
Author:张震沣 |
Hits:
Description: 读取cpu的序列号和名称,用与对文件的保护处理等.包含源代码for delphi-cpu read the serial numbers and names, and with the protection of the document processing. Included source code for delphi Platform: |
Size: 178176 |
Author:录音 |
Hits:
Description: 让运行的exe都加一个密码保护.
对你的隐私很好的保护. -run exe were to a password-protected. To your good privacy protection. Platform: |
Size: 350208 |
Author:wolf |
Hits:
Description: 硬盘保护程序。对数据进行保留。和国内的还原卡一样的功能。-drive protection program. The data retention. And the reduction of domestic cards the same capabilities. Platform: |
Size: 244736 |
Author:yuyang |
Hits:
Description: Delphi的自毁程序。在您程序中加入该程序段,当附合条件后,该程序可以自已毁了自已。可以实现程序的自我保护。-destruction procedures. In your process of joining the program, with conditions attached, the procedures themselves can destroy themselves. The procedure can achieve self-protection. Platform: |
Size: 1024 |
Author:刘立 |
Hits:
Description: 文件夹卫士,保护你的文件夹不被非法操作, 可以任意添加文件夹,或取掉不需保护的文件夹.-folder guard, protect your folder is not illegal operation, you can add arbitrary folder, profusely without protection or the folder. Platform: |
Size: 593920 |
Author:2386869 |
Hits:
Description: 利用Internet Protocol Helper API interface结口开发的一个arp保护工具.
开发工具:delphi7-The use of Internet Protocol Helper API interface I developed a knot arp protection tool. Development tools: delphi7 Platform: |
Size: 236544 |
Author:张三 |
Hits:
Description: 本书是红帽Linux 9的完整指南。无论把Linux作为服务器还是桌面操作系统,本书都提供了安装、配置与管理最新操作系统的实用信息。本书介绍的内容包括Linux安装,命令行界面,Linux系统管理与配置,诊断引导过程,内核重新编译,使用GNOME与KDE,了解基本TCP/IP网络,保护Linux防火墙,设置安全远程访问,安装和测试DNS、DHCP、CUPS与sendmail,配置和查错FTP、NFS、Samba与Apache,另外还介绍了Linux认证的要求。本书适合于有兴趣学习红帽Linux的各层次读者。-This book is Red Hat Linux 9 complete guide. Regardless of the Linux as a server or desktop operating system, this book has been providing installation, configuration and management of practical information on the latest operating system. Described in this book include the Linux installation, command-line interface, Linux system administration and configuration, diagnosis and guide the process, the kernel re-compile, use GNOME and KDE, to understand the basic TCP/IP network, the protection of Linux firewall, set up secure remote access, installation and testing of DNS, DHCP, CUPS with sendmail, configuration and error checking FTP, NFS, Samba and Apache, also introduced a Linux certification requirements. This book is suitable for Red Hat Linux are interested in learning at all levels of readers. Platform: |
Size: 44752896 |
Author:西仁 |
Hits:
Description: 通过注册监控函数,对目录的变动进行监控。需要对自有文件保护的可以参考-Registered monitoring function, to monitor directory changes. The need for the protection of its own documents can refer to Platform: |
Size: 14336 |
Author:coffee |
Hits:
Description: 很好的文章,用于共享软件的注册保护.文章从调用注册流程、验证注册密钥、存储注册验证结果三个方面举例说明了软件正确的注册验证方式,指出了大多数共享软件作者在注册验证代码的编写中常犯的错误,灵活运用文章中的方法,可以最大限度的增加破解工作者的工作量,从而为自己争取更多的正版存活时间-Very good article, for sharing the registration of software protection. Article from the call registration process, verify the registration keys, storage for registration to verify the results of three examples to illustrate the registration of the software to verify the correct way, pointing out that the majority of shareware authors registration verification code in the preparation of the mistakes often, flexible way to use the article, you can minimize the increase in workload to crack, so as to fight for their survival time of more genuine Platform: |
Size: 273408 |
Author:绝对零度 |
Hits:
Description: 修改内存保护的对写外挂有帮助!修改内存保护的对写外挂有帮助!-Modify the memory protection will help to write plug-ins! Modify the memory protection will help to write plug-ins! Platform: |
Size: 8192 |
Author:水月 |
Hits:
Description: 利用花指令扰乱Cracker,以达到保护软件的作用。
本工具可以自定义花指令,有三种模式,如下:
1、随机插入花指令
2、指定插入固定的花指令
3、全部插入花指令
使用方法:
1、请自行在 JunkData.mdb 数据库中添加花指令
2、在您要放花指令的地方写:{$F Junk}
3、{$F Junk} 为花指令标记
4、用本工具处理后,重新编译即可。-Disrupt the use of junk code Cracker, in order to achieve the role of protection software. This tool can customize the junk code, there are three modes, as follows: 1, randomly insert junk code 2, the designated fixed insert junk code 3, the full insert junk code to use: 1, your own database in JunkData.mdb add junk code 2, in the command you want to put flowers where to write: ($ F Junk) 3, ($ F Junk) tag for flower orders 4, after treatment with this tool, you can re-compile. Platform: |
Size: 711680 |
Author:长毛 |
Hits:
Description: :随着计算机控制网络的迅速发展,串口通讯得到了广泛应用。文章针对在电站微机保护中碰到的串口通讯问题,提供了3种基于Delphi的串口通讯解决方法。-: With the computer-controlled networks, the rapid development of serial communication has been widely applied. Based on microprocessor-based protection in the power station they encountered in serial communication problems, provides three kinds of serial communication based on the Delphi solution. Platform: |
Size: 129024 |
Author:周炜 |
Hits:
Description: 到得CPU序列号、网卡MAC地址、注册码保护例子。 希望对大家有用-To a CPU serial number, the network card MAC address, examples of key protection. I hope all of you a useful Platform: |
Size: 1009664 |
Author:xinchangkk |
Hits:
Description: MachineID Protection for Delphi & C++ Builder
Copyright ?2003 Ionworx Technology
All Rights Reserved
www.ionworx.com
support@ionworx.com
Last Update: 21, March 2003- MachineID Protection for Delphi & C++ Builder
Copyright ?2003 Ionworx Technology
All Rights Reserved
www.ionworx.com
support@ionworx.com
Last Update: 21, March 2003 Platform: |
Size: 289792 |
Author:pc007 |
Hits: