登录
首页 » 加密解密 » NAME: gmfsk VERSION: 0.6 RELEASE: 1 SUMMARY: Gnome MFSK, RTTY, THROB, PSK3...

NAME: gmfsk VERSION: 0.6 RELEASE: 1 SUMMARY: Gnome MFSK, RTTY, THROB, PSK3...

于 2023-08-21 发布 文件大小:324.00 kB
0 120
下载积分: 2 下载次数: 1

代码说明:

NAME: gmfsk VERSION: 0.6 RELEASE: 1 SUMMARY: Gnome MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER terminal DISTRIBUTION: OH2BNS VENDOR: OH2BNS LICENSE: GPL PACKAGER: Tomi Manninen GROUP: Applications/Communications OS: linux ARCH: i386 SOURCE RPM: gmfsk-0.6-1.src.rpm DESCRIPTION: gMFSK is a terminal program for MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER. -NAME: gmfsk VERSION: 0.6 RELEASE: 1 SUMMARY: Gnome MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER terminal DISTRIBUTION: OH2BNS VENDOR: OH2BNS LICENSE: GPL PACKAGER: Tomi Manninen GROUP: Applications/Communications OS: linux ARCH: i386 SOURCE RPM: gmfsk-0.6-1.src.rpm DESCRIPTION: gMFSK is a terminal program for MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • dos environment sequence drives the use of encryption procedures
    dos环境下的利用硬盘序列号加密的程序-dos environment sequence drives the use of encryption procedures
    2022-02-15 19:34:51下载
    积分:1
  • DES算法的C++
    DES加密算法的C++实现-DES encryption algorithm in C++
    2023-04-13 06:10:03下载
    积分:1
  • computer security,an introduction to computer security,you can learn much from i...
    计算机安全的一本很好的书,其中有关安全密要等重要的内容,是一本不错的书-computer security,an introduction to computer security,you can learn much from it , a very good book
    2023-01-29 23:20:05下载
    积分:1
  • enumcsp
    EnumCSP - Enumerates Crypto Service Providers Copyright (c) 2000-2004 G.Chapillon All Rights Reserved. Contributor: Jupiter -EnumCSP- Enumerates Crypto Service Providers Copyright (c) 2000-2004 G. Chapillon
    2022-04-08 01:32:04下载
    积分:1
  • file encryption using the C source code
    文件加密用的C++源代码-file encryption using the C source code
    2023-09-06 13:50:03下载
    积分:1
  • 山排序算法:基本思想:全序无序分离…
    希尔排序算法: 基本思想:将整个无序序列分割成若干小的子序列分别进行插入排序。 序列分割方法:将相隔某个增量h的元素构成一个子序列。在排序过程中,逐次减小这个增量,最后当h减到1时,进行一次插入排序,排序就完成。增量序列一般采用:ht=2t-1,1≤t≤[log2n],其中n为待排序序列的长度。-Hill sorting algorithm: the basic idea: the whole sequence disorder is separated into a number of small sub-sequences respectively Insertion Sort. Sequence segmentation method: h will be separated by an incremental elements constitute a subset of sequences. In the sort process, the successive decrease of the increment, and finally reduced to one when h when an insertion sort, sort completed. Incremental sequence generally use: ht = 2t-1, 1 ≤ t ≤ [log2n], in which n is the length of sequence to be sorted.
    2022-02-06 21:23:34下载
    积分:1
  • 与受信任的数据库 & 电子邮件共享项目状态
    < 跨度 style="font-size:14.0pt;line-height:115%;font-family:""> weposit,有利安全数据库 leveragingserver-身边值得信赖的硬件可以建一个羽翼丰满,隐私和在 commonserver 硬件上运行成本 (现有或未来) 的任何已启用加密的私人数据处理的一小部分。
    2022-03-03 18:33:38下载
    积分:1
  • 混合程序,RSA算法DES钥,DES算法消息.很多通讯系统都是这样的...
    混合加密程序,RSA算法加密DES密钥,DES算法加密消息.很多通讯系统都是这样加密的-Hybrid encryption, RSA key DES encryption algorithm, DES encryption algorithm message. A lot of communication systems, are encrypted
    2022-06-03 09:21:50下载
    积分:1
  • 一个非常好的ASE代码,通过实验证明能编译通过
    一个非常好的ASE代码,通过实验证明能编译通过-A perfect AES program code, and it can be run after translation and edition.
    2022-12-08 08:50:03下载
    积分:1
  • 为一个字节或字符数组或串计算md5值,内部只创建一个数组,节省分配时间,节省内存 完全是static方法,线程安全 注意对返回值的处理,见注释
    为一个字节或字符数组或串计算md5值,内部只创建一个数组,节省分配时间,节省内存 完全是static方法,线程安全 注意对返回值的处理,见注释-for a byte array or character string or md5 value calculation, only to create an internal array, saving time allocated to save memory is completely static method, thread-safe attention to the return value, see note
    2022-01-28 07:19:00下载
    积分:1
  • 696518资源总数
  • 105714会员总数
  • 27今日下载