-
x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。
执行命令方式为:
-o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
- 2022-05-21 01:18:22下载
- 积分:1
-
一个文件加密的例子
一个文件加密的例子-Example of a file encryption
- 2022-01-27 09:01:24下载
- 积分:1
-
使用单片来进行CRC校验,可以位校验、半字节和字节校验
使用单片来进行CRC校验,可以位校验、半字节和字节校验-Using the single-chip to carry out CRC check, you can place check, half-byte and byte checksum
- 2022-06-02 13:33:20下载
- 积分:1
-
参考了电脑爱好者2000第10期的一篇关于将文件隐藏于位图中的文章,本程序还有许多可以改进的地方,例如可以加入CRC校验,加密,多线程等内容。...
参考了电脑爱好者2000第10期的一篇关于将文件隐藏于位图中的文章,本程序还有许多可以改进的地方,例如可以加入CRC校验,加密,多线程等内容。-reference to the 2000 resolution computer enthusiasts 10 of a document on Bitmap hidden in the article, there are many procedures can be improved, for example, can join the CRC, encryption, such as multithreading.
- 2022-02-07 05:34:58下载
- 积分:1
-
md5算法,实现给一个512bir数据块加密,程序有详细的注释,
md5算法,实现给一个512bir数据块加密,程序有详细的注释,-md5 algorithm, to realize a data block encryption 512bir, procedures have detailed notes,
- 2022-04-18 22:49:48下载
- 积分:1
-
MD5
c++实现的MD5算法及测试代码,BCB2007的测试工程(c++ implementation of the MD5 algorithm and test code, BCB2007 test engineering)
- 2013-07-25 15:52:57下载
- 积分:1
-
including key disk production software, LIB, DLL encryption modules in various l...
包括密钥盘制作软件、LIB、DLL 加密模块 各种语言调用加密模块的例子程序、网络注册软件等-including key disk production software, LIB, DLL encryption modules in various languages called encryption module example, Web registration software
- 2022-04-12 13:10:22下载
- 积分:1
-
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工具使用一种合法的算法,这种算法本身并不意味着要隐藏任何信息。-twocrypt (2c) is a PoC tool, uses in the ultra arrogance. It
encrypts two documents. The different password may use in the solution
to translate the different variable. The output cannot from
individually encrypt in the document to distinguish, and this tool
uses one legitimate algorithm, this algorithm itself certainly did not
mean must hide any information.
- 2022-11-27 16:40:03下载
- 积分:1
-
DigitalSignature
数字签名的加密和解密原理机制,以及附带Java源程序(Digital signature of the principle of encryption and decryption mechanism, as well as incidental Java source)
- 2008-01-16 07:53:19下载
- 积分:1
-
一个简单的加密算法Kaiser(C语言)
一个简单的加密算法Kaiser(C语言实现) -A simple encryption algorithm Kaiser (C language)
- 2023-05-09 14:25:03下载
- 积分:1