Description: 可逆加密组件
====================== 使用方法 ============================================
Dim objEncrypt
Set objEncrypt = Server.CreateObject(\"myEncrypt.clsEncrypt\")
Dim strReturn 加密后文本
Dim strValue 加密前文本
加密开始
设置密钥(此行可以省略)
objEncrypt.KeyCode=\"1111\"
开始加密
strReturn = objEncrypt.Encrypt(strValue)
解密
设置密钥(如果加密时没有设置,此行可以省略)
objEncrypt.KeyCode=\"1111\"
开始解密
strReturn = objEncrypt.UnEncrypt(strValue)
注意:
strReturn可能返回以下值
-3 : 密钥长度超过10
-2 : 表示文本设置了密钥,但是解密时没有指定密钥
-1 : 表示文本设置了密钥,但是解密时指定的密钥与原先设置的密钥不一样
注意:密钥需要小于10个字符且必须为键盘上的字符,否则可能导致无法正确解密-reversible encryption components use ==== ====================== ======================================== Dim objEncrypt Set objEncrypt = Server.Create Object ( "myEncrypt.clsEncrypt") Dim strRetu rn encrypted text Dim strValue encrypted text before start providing encryption key (this trip can be omitted) o bjEncrypt.KeyCode = "1111" began encryption strReturn = ob jEncrypt.Encrypt (strValue) decryption keys set (if no encryption settings this trip can be omitted) objEncrypt.KeyCode = "1111" began declassified strR eturn = objEncrypt.UnEncrypt (strValue) Note : strReturn may return the following values -3 : Key length exceeding 10 -2 : To set up a key text, But when no specific decryption key -1 : To set up a key text, However, when the decryption keys with t Platform: |
Size: 20631 |
Author:张峰 |
Hits:
Description: 本程序主要演示server对象的CreateObject方法的使用,由server.createobject创建的对象具有页作用域,当前asp页处理完成后,服务器自动清除这些对象。-major demonstration of the process server object CreateObject method of use, server.createobject created by the target page with Scope, current asp page treatment is completed, the server automatically remove these objects. Platform: |
Size: 809 |
Author:杨洋 |
Hits:
Description: vnc本地口令破解C源代码
默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\\Software\\ORL\\WinVNC3\\Password Set WshShell = server.CreateObject(\"WScript.Shell\") bkey=WSHShell.RegRead(\"HKCU\\Software\\ORL\\WinVNC3\\Password\") for each str in bkey response.write hex(str) next 读取出来后结果类似 49 40 15 F9 A3 5E 8B 22这种十六进制,这是VNC加密的密码。我们可以用vncx4 破解它,vncx4使用很简单,只要在命令行下输入 c:\\>vncx4 -W 然后顺序输入上面的每一个十六进制数据,每输完一个回车一次就行了。-vnc local crack password C source code default under VNC server password is placed on the registry. The tools only address this situation. First ASP registry read out the encryption password, and then use the tool to break the resolve. I have given you a password to read VNC ASP script, By default under the VNC password stored in HKCU \\ Software \\ ORL \\ WinVNC3 \\ P assword Set WshShell = server.CreateObject ( " WScript.Shell ") bkey = WSHShell.RegRead (" HK CU \\ Software \\ ORL \\ WinVNC3 \\ Password ") for eac h str in bkey response.write hex (str) next read out After similar results F9 49 40 15 22 A3 5E 8B this hexadecimal, it is encrypted VNC password. Vncx4 we can resolve it, vncx4 simple to use, as long as the command line input c : \\ Platform: |
Size: 4104 |
Author:小李 |
Hits:
Description: <%@ LANGUAGE=\"VBSCRIPT\" %>
<!--#include file=\"conn.asp\" -->
<%
ProductClass_2=request(\"ProductClass_2\")
set rs=server.createobject(\"adodb.recordset\")
sqltext=\"select * from Product\"
if request(\"Product_Name\")<>\"\" then
sqltext=sqltext &\" where Product_Name like %\"& request(\"Product_Name\") &\"% \"
else
sqltext=sqltext &\" where Product_Name like %\"& \"\" &\"% \"
end if
if request(\"Product_Class\")<>\"\" then
sqltext=sqltext &\" and Class_1 like %\"& request(\"Product_Class\") &\"% \"
end if Platform: |
Size: 3531 |
Author:金立犇 |
Hits:
Description: 可逆加密组件
====================== 使用方法 ============================================
Dim objEncrypt
Set objEncrypt = Server.CreateObject("myEncrypt.clsEncrypt")
Dim strReturn 加密后文本
Dim strValue 加密前文本
加密开始
设置密钥(此行可以省略)
objEncrypt.KeyCode="1111"
开始加密
strReturn = objEncrypt.Encrypt(strValue)
解密
设置密钥(如果加密时没有设置,此行可以省略)
objEncrypt.KeyCode="1111"
开始解密
strReturn = objEncrypt.UnEncrypt(strValue)
注意:
strReturn可能返回以下值
-3 : 密钥长度超过10
-2 : 表示文本设置了密钥,但是解密时没有指定密钥
-1 : 表示文本设置了密钥,但是解密时指定的密钥与原先设置的密钥不一样
注意:密钥需要小于10个字符且必须为键盘上的字符,否则可能导致无法正确解密-reversible encryption components use ==== ====================== ======================================== Dim objEncrypt Set objEncrypt = Server.Create Object ( "myEncrypt.clsEncrypt") Dim strRetu rn encrypted text Dim strValue encrypted text before start providing encryption key (this trip can be omitted) o bjEncrypt.KeyCode = "1111" began encryption strReturn = ob jEncrypt.Encrypt (strValue) decryption keys set (if no encryption settings this trip can be omitted) objEncrypt.KeyCode = "1111" began declassified strR eturn = objEncrypt.UnEncrypt (strValue) Note : strReturn may return the following values-3 : Key length exceeding 10-2 : To set up a key text, But when no specific decryption key-1 : To set up a key text, However, when the decryption keys with t Platform: |
Size: 20480 |
Author:张峰 |
Hits:
Description: 本程序主要演示server对象的CreateObject方法的使用,由server.createobject创建的对象具有页作用域,当前asp页处理完成后,服务器自动清除这些对象。-major demonstration of the process server object CreateObject method of use, server.createobject created by the target page with Scope, current asp page treatment is completed, the server automatically remove these objects. Platform: |
Size: 1024 |
Author:杨洋 |
Hits:
Description: vnc本地口令破解C源代码
默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\Software\ORL\WinVNC3\Password Set WshShell = server.CreateObject("WScript.Shell") bkey=WSHShell.RegRead("HKCU\Software\ORL\WinVNC3\Password") for each str in bkey response.write hex(str) next 读取出来后结果类似 49 40 15 F9 A3 5E 8B 22这种十六进制,这是VNC加密的密码。我们可以用vncx4 破解它,vncx4使用很简单,只要在命令行下输入 c:\>vncx4 -W 然后顺序输入上面的每一个十六进制数据,每输完一个回车一次就行了。-vnc local crack password C source code default under VNC server password is placed on the registry. The tools only address this situation. First ASP registry read out the encryption password, and then use the tool to break the resolve. I have given you a password to read VNC ASP script, By default under the VNC password stored in HKCU \ Software \ ORL \ WinVNC3 \ P assword Set WshShell = server.CreateObject ( " WScript.Shell ") bkey = WSHShell.RegRead (" HK CU \ Software \ ORL \ WinVNC3 \ Password ") for eac h str in bkey response.write hex (str) next read out After similar results F9 49 40 15 22 A3 5E 8B this hexadecimal, it is encrypted VNC password. Vncx4 we can resolve it, vncx4 simple to use, as long as the command line input c : \ Platform: |
Size: 4096 |
Author:小李 |
Hits:
Description: <%@ LANGUAGE="VBSCRIPT" %>
<!--#include file="conn.asp" -->
<%
ProductClass_2=request("ProductClass_2")
set rs=server.createobject("adodb.recordset")
sqltext="select * from Product"
if request("Product_Name")<>"" then
sqltext=sqltext &" where Product_Name like %"& request("Product_Name") &"% "
else
sqltext=sqltext &" where Product_Name like %"& "" &"% "
end if
if request("Product_Class")<>"" then
sqltext=sqltext &" and Class_1 like %"& request("Product_Class") &"% "
end if-< @ LANGUAGE = VBSCRIPT ><!--# Include file = conn.asp -->< ProductClass_2 = request ( ProductClass_2 ) set rs = server.createobject ( adodb.recordset ) sqltext = select* from Product if request ( Product_Name )<> then sqltext = sqltext Platform: |
Size: 3072 |
Author:金立犇 |
Hits:
Description: 一个浏览缩小图的组件,专为像创建在线相册薄等以网络为基础的应用程序开发服务。
name:www.chinaz.com
sn:48958-77556-02411
name:chinaz
sn:71316-48529-38722
安装的时候
填入name:后面的用户名 例如 www.chinaz.com
然后在程序写
Set jpg = Server.CreateObject("Persits.Jpeg")
jpg.RegKey = "48958-77556-02411" -A browser to narrow the chart components, designed to create online albums, like thin, such as web-based application development services. name: www.chinaz.comsn:48958-77556-02411name:chinazsn:71316-48529-38722 time to fill in the installation of name: after the user name and then in the process such as www.chinaz.com write Set jpg = Server.CreateObject (Persits . Jpeg) jpg.RegKey = 48958-77556-02411 Platform: |
Size: 1400832 |
Author: |
Hits:
Description: BASE64编码和解码COM组件
Set Obj=Server.CreateObject("DBstep.Base64") 创建对象
x=Obj.EncodeBase64("要加密的字符串")
y=Obj.DecodeBase64("要解密的字符串")
Set Obj=nothing 释放对象
-BASE64 encoding and decoding COM components
Set Obj=Server.CreateObject("DBstep.Base64")
x=Obj.EncodeBase64(string)
y=Obj.DecodeBase64("string")
Set Obj=nothing Platform: |
Size: 78848 |
Author:nclyj |
Hits:
Description: 能够从VC程序中调用网页中的JS代码,从而扩展你程序和网页的功能-VC program can call the page from the JS code to extend the functionality of your application and web pages Platform: |
Size: 3949568 |
Author:wangyu |
Hits:
Description: 一.源码说明
本源码是一款功能十分强大的分类信息整站。是我在网上搜集而来,本地已测试N遍完整,已集成了论坛,所有功能全部可用。源码内附带了ASP本地调试工具,打开后即可本地调试。
此源码暂时没有演示地址,请看首页演示截图。
二.安装说明:
解压后将web文件夹里的所有文件上传至空间根目录,即可运行。
后台地址http://localhost/lovepiao/
管理员帐号和密码:admin
三.用户注册和修改密码说明:
用户注册最后一步如果出现以下错误的解决方法:
Microsoft VBScript 运行时错误 800a01ad
ActiveX 部件不能创建对象: Server.CreateObject
\regchkok.asp, line 162
把补丁文件夹里的regchkok.asp和u_editzl.asp(这个是用户修改密码)复制到根目录并覆盖
出错的原因是空间不支持jmail组件。-I. Source Description
The source is a very strong function of the classified information the entire station. I gather from the Internet, the local has been tested over the complete N, has integrated the forum, all the features of all available. Source attached to a local ASP debugging tool that opens to local debugging.
No demonstration of this source address, see page demo screenshot.
Two. Installation Instructions:
Web folder after extracting all the files uploaded to the root directory space, you can run.
Address http://localhost/lovepiao/ background
Administrator account and password: admin
Three. User registration and change the password instructions:
Register the following error if the last step solution:
Microsoft VBScript runtime error 800a01ad
ActiveX component can not create object: Server.CreateObject
\ regchkok.asp, line 162
The patch folder in the regchkok.asp and u_editzl.asp (this is the user change the password) to the root directory and overwri Platform: |
Size: 10907648 |
Author:张天明 |
Hits: