资源列表
imageattackandencryption
- 此程序仅仅用于学术交流,若用于其他商业目的,于本人无关。-this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
doublerandomphaseencryptionofbiologytrait
- 这个程序用于图像的加密和隐藏,在加密过程中,将原来的图像加密成白噪声,使攻击者没有办法解密。此程序仅仅用于学术交流-procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academi
showenv
- 显示所有Linux 环境变量可执行文件,包括C程序源代码,RedHat Linux下使用-show all Linux executable environment variables, including the C source code, RedHat Linux use
NetTraffic-vc6.0
- VC++6.0写的网络流量监控器.模拟WINDOWS的网络监控.看见监视自己电脑现在的网络情况-written by VC 6.0 network traffic monitor. Analog Windows network monitoring. See their surveillance Now the computer network
nbtstat-vc6.0
- VC++6.0写的网段扫描器.基于UDP.可以查看自己电脑所在的网段情况-wrote of the network scanner. Based on UDP. Can check its own computer network segment where the situation
Action-Policy
- XACML的行为策略集合-XACML behavior strategy set
MSDEV_Cmd_Line
- 如何用命令行编译创建VC程序的例子程序记源代码-how to use a command line compiler VC procedures established procedures in mind the example source code
WOL_RemoteMacFinder_prj
- 国外经典源码``` 本人觉得还非常好``` -source of foreign classics `` `I feel very good ``` little ``````````````
unix_network_programming
- unix网络编程 第1卷 套接口API和X/Open传输接口API unix网络编程 第2卷 进程间通信 包括这两卷的源代码-unix Network Programming, Vol 1 socket API and X / Open Transmission Network Interface API unix Liaison Program, volume 2, inter-process communication, including two volumes of the so
CBC_DESEncryption
- 使用分组加密方法加密解密数据,分组长度为64位,使用反馈机制的分组密码使用方法.-use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
3DES_Encryption
- 3DES算法是增强型的DES算法,使用128位密钥长度, CBC模式使用反馈机制的分组密码使用模式.-3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
DES_Encryption
- DES加密解密文本文件,使用分组加密方法加密解密数据,分组长度为64位.-DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.