-
Xor called symmetric encryption module's function can be
Xor对称加密 调用模块里的函数即可-Xor called symmetric encryption module"s function can be
- 2023-07-08 00:05:03下载
- 积分:1
-
- 2022-06-27 03:44:25下载
- 积分:1
-
sha源代码
sha源代码-sha source code
- 2022-05-23 14:15:16下载
- 积分:1
-
加密算法SHA1的C语言实现示例,是一个C++类实现
加密算法SHA1的C语言实现示例,是一个C++类实现-The example of encryption arithmetic SHA1 using C program,which is a C++ class.
- 2022-12-28 15:30:03下载
- 积分:1
-
DES的C语言原代码,可以运行出结果的.
DES的C语言原代码,可以运行出结果的.-the C language source code that can run out results.
- 2022-01-26 02:09:12下载
- 积分:1
-
这是一个获取ACCESS 数据库密码的强悍软件, 适用于ACCESS2
这是一个获取ACCESS 数据库密码的强悍软件, 适用于ACCESS2-This a password access to the Access database software intrepid apply to ACCESS2
- 2022-03-04 05:45:26下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
document encryption software source code, document encryption to drive to genera...
加密文件软件源代码,把要加密文件拖动到生成软件上,按照软件提示要求即可进行保密措施.此源代码为本人校友编辑-document encryption software source code, document encryption to drive to generate software, in accordance with the software can suggest requirements for security measures. This source code for my alumni editor
- 2022-02-05 04:06:57下载
- 积分:1
-
DES算法实现过程分析
DES算法实现过程分析-DES algorithm analysis
- 2023-03-24 11:50:03下载
- 积分:1
-
写专属或加密程序。 程序应该采取作为输入由程序然后加密的文件名。 程序应该要求用户输入密钥,应该用于加密文件。
程序的输出应该进入一个文件以同一个文件名,但...
写专属或加密程序。 程序应该采取作为输入由程序然后加密的文件名。 程序应该要求用户输入密钥,应该用于加密文件。
程序的输出应该进入一个文件以同一个文件名,但.ENC引伸。-Write an exclusive-OR encryption program. The program should take as input a filename that is then encrypted by the program. The program should ask the user to input an encryption key, which should be used to encrypt the file.
The output of the program should go into a file with the same filename but a .ENC extension.
- 2022-08-17 16:43:26下载
- 积分:1