搜索资源列表
thread timer (D7).zip
- This component has the same functionality of the default Timer component, but it provides a higher resolution, until a maximum of 1 milisecond.
whoHasThisRight.zip
- who has this right
ict010.zip
- Giga Crime Fighting Mecha Gelato-Bots: The Supreme Icecream-Tron Revolution 8,000,000. A top-down adventure game with three themes; mecha, anime and icecream. This project hopes to evolve with action/rpg/multiplayer elements like classic console game
PingPro.zip
- This is a utility that allows you to ping other computers. It includes other utilities, such as one that allows you to get information about the local machine and encrypt/decrypt files.
dess.zip
- Fast DES kit - Phil Karn, KA9Q September 2, 1994 This archive includes optimized DES code in portable C, Borland inline assembler for the 386, and GNU 'as' format assembler for the 386. Contents: readme - this file readme.des - details on
loki加密算法C语言源代码
- loki加密算法 /* This is an independent implementation of the encryption algorithm: */ /* */ /* LOKI97 by Brown and Pieprzyk */ /*
P2P_by_shootingstars
- 这是一个在TCP/IP编程中经常遇到要处理的 问题,就是网络地址转换NAT,改源代码提供 一种方法,穿透内网的保护,到达目的地址。- This the question which frequently meets in the TCP/IP programming must process, is network address translation NAT, changes the source code to provide one method, in the penetratio
File_Handler
- 这个类提供了一个快速和更简单的方式来使用RC4算法来加密和解密文件。它也包括了用来打开,读取,编写和附加文件的方法。包括了一个类的演示客户端程序。- This kind has provided fast and the simpler way uses the RC4 algorithm to encrypt reconciles the dense document. It also included has used for to open, reads takes, compilat
socks5 remote exploit
- socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redh
crack2
- 我的原创破解教程,我用两种工具ollydbg,smarkcheck分别对这个软件做了破解,动画里讲明了,我的破解过程,让初学破解 朋友学习研究- My 鍘熷垱 explains the course, I used two kind of tools ollydbg, smarkcheck separately to do to this software have explained, in the animation clarified, I explained the process,
jm
- 这是一个加密文件的程序,-This is a document encryption procedures,
FixMiniFrame_Project
- this remote graphic editor and debugger source
ConvNums
- This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contains a summary of what you will find in each of the files that make up your ConvNums
DES for VB
- 本程序封装了一个加解密模块. 使用时直接调用其中的函数即可.- This procedure has sealed a Canadian decipher module When use directly transfers function then
tdb-1.0.6.tar
- Linux下的一个关系数据库源代码,Samba用到了该部分代码。-Linux relational database source code, Samba used this part of codes.
网络安全技术解析-20020920
- 本教程是面向对网络安全感兴趣的菜鸟们的,只要对网络安全感兴趣,无须计算机基础,就能轻松上手,赶快看看吧!也希望籍此结交高手,交流心得,扩大我们计算机从业人员队伍。-this tutorial is geared to network security Caidaomen interest, as long as network security interest, not computer based, it was easy to get started soon and see! Also
cmdbind2
- 让进程在系统中更加隐蔽(2) 一般来说一个后门程序需要更改系统的某些文件来让程序在系统启动执行这个程序, 又要在某个地方保留这个程序(一般是在硬盘)。如果有什么办法不这样做又让程序在 系统中运行的话,就可以使后门程序更加隐蔽。也就是说程序在硬盘上找不到在系统的 启动配置中没有这有项。真正要做到这样好象不太现实,但可以采用简单的方法:在程 序被执行后删除程序文件和启动文件中被更改的部分,然后在系统被关闭前保留程序文 件和更改启动文件,让它在系统启动时又能被执行。 程序是一个可执行文件在被执行时系统
混合密码系统
- 这是一个混合密码系统,利用多种方式加密-This is a mixed-code system and a variety of forms of encryption
tsw-qhe-This
- 这是利用多线程来进行文件传输的通讯工具,很好用,不错的-This is to use the multithreading for file transfer communication tools, useful, good
tesk-This
- This a cell edge detection process After test pass, good source is very good-This is a cell edge detection process After test pass, good source is very good
