-
这是一个获取ACCESS 数据库密码的强悍软件, 适用于ACCESS2
这是一个获取ACCESS 数据库密码的强悍软件, 适用于ACCESS2-This a password access to the Access database software intrepid apply to ACCESS2
- 2022-03-04 05:45:26下载
- 积分:1
-
Internet上的PIK加密算法源程序
Internet上的PIK加密算法源程序-on the Internet PIK encryption algorithm source code
- 2022-12-04 09:35:02下载
- 积分:1
-
MD5的c/c++的一个实现范例,包含MD5开发包
MD5的c/c++的一个实现范例,包含MD5开发包-MD5 of c/c++ Realize a sample, including MD5 Development Kit
- 2022-02-15 16:48:20下载
- 积分:1
-
超级增强断点源代码!配合trw2000和sice 使用!可以调试一些反调试的外壳和程序! 用vc编译...
超级增强断点源代码!配合trw2000和sice 使用!可以调试一些反调试的外壳和程序! 用vc编译-Super enhance breakpoint source code! Sice tie trw2000 and use! Some anti-debugging can debug shell and procedures! Compiling with vc
- 2022-01-26 00:46:25下载
- 积分:1
-
凯撒和维吉尼亚加密方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。...
凯撒和维吉尼亚加密方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。-Caesar and Virginia encryption method, two algorithms are not very complicated, so the basic principles are also similar to a document written to express.
- 2022-12-14 15:10:03下载
- 积分:1
-
The Cryptography API: Next Generation (CNG) is a new and agile framework in Wind...
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider. -The Cryptography API: Next Generation (CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
- 2022-04-29 00:05:09下载
- 积分:1
-
sha1sum验证算法,cd分发映像文件的,sha1值得计算,验证sha1
sha1sum验证算法,cd分发映像文件的,sha1值得计算,验证sha1-sha1sum verification algorithm, distributed cd image files, sha1 worth calculation, the certification sha1
- 2022-03-25 08:47:43下载
- 积分:1
-
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制...
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制的声音.-I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their voices.
- 2022-07-24 12:24:23下载
- 积分:1
-
File Encryption Utility (using Blowfish encryption algorithm to document the int...
File Encryption Utility(使用Blowfish算法给文件加密的完整程序)VC 源代码-File Encryption Utility (using Blowfish encryption algorithm to document the integrity of procedures) VC source code
- 2022-07-24 00:02:11下载
- 积分:1
-
jsp管理系统
jsp管理系统 -jsp Management System
- 2023-07-10 17:45:03下载
- 积分:1