CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 系统编程 搜索资源 - defend

搜索资源列表

  1. BFAntiVir

    0下载:
  2. VB编写的计算机病毒主动防御代码,通过API HOOK技术,拦截危险操作来防御计算机病毒木马攻击。-Computer viruses written VB code for active defense, through the API HOOK Technology, intercepting dangerous operation to defend against computer viruses, Trojan horse attacks.
  3. 所属分类:Windows Kernel

    • 发布日期:2017-05-09
    • 文件大小:2491375
    • 提供者:凌浩
  1. USB-protect-soure

    0下载:
  2. usb存储安全源代码,用vb编写的,很好用,自己可以参照源码试试看-usb protect source to defend your usb
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-03-31
    • 文件大小:1729
    • 提供者:
  1. my_defend

    0下载:
  2. 我的守护进程实例,在linux下创建的守护进程-my defend program in linux
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-11-14
    • 文件大小:768
    • 提供者:刘建林
  1. morpho_easy_hdr_ext

    0下载:
  2. Hashes the given key.We apply this secondary hashing discovered by Doug Lea to defend against bad hashes. -Hashes the given key.We apply this secondary hashing discovered by Doug Lea to defend against bad hashes.
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-04-15
    • 文件大小:6651
    • 提供者:qongunren
  1. check-version-min

    0下载:
  2. We apply this secondary hashing discovered by Doug Lea to defend against bad hashes. -We apply this secondary hashing discovered by Doug Lea to defend against bad hashes.
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-04-14
    • 文件大小:4145
    • 提供者:mbdeikun
  1. SkDrawTransparentShader

    0下载:
  2. We apply this secondary hashing discovered by Doug Lea to defend against bad hashes. -We apply this secondary hashing discovered by Doug Lea to defend against bad hashes.
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-04-14
    • 文件大小:2971
    • 提供者:xaihunzei
  1. baycom

    0下载:
  2. We apply this secondary hashing discovered by Doug Lea to defend against bad hashes. -We apply this secondary hashing discovered by Doug Lea to defend against bad hashes.
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-04-14
    • 文件大小:2968
    • 提供者:yakonmb
  1. hashmap

    0下载:
  2. We apply this secondary hashing discovered by Doug Lea to defend against bad hashes. -We apply this secondary hashing discovered by Doug Lea to defend against bad hashes.
  3. 所属分类:Linux-Unix program

    • 发布日期:2017-04-13
    • 文件大小:2327
    • 提供者:dinzaoyue
搜珍网 www.dssz.com