搜索资源列表
DES for VB
- 本程序封装了一个加解密模块. 使用时直接调用其中的函数即可.- This procedure has sealed a Canadian decipher module When use directly transfers function then
addpass
- 这个程序是VB编写的加密解密程序,希望对大家有所帮助.-the procedure is written in VB and encryption and decryption procedures, we hope to help.
VBCorLib
- 这是一个在vb下实现的各种加密程序,可以实现一般的文本加密和文件加密,但是很多算法都是已经被人破解过的.-in vb under the encryption procedure, the realization of the text encryption and file encryption, But many of the algorithms have been decoded before.
PacketX_1[1].1.zip
- PacketX 破解文件 用VB、DELPHI 来写截获数据包的程序了,Documents PacketX crack VB, DELPHI intercepted packet to write the procedure
vb_sncode
- 这是VB使用加密方法实现的软件序列号验证实例,相对不加密的序列号,当然可以提高可靠性,程序包中含有两个源程序,一个是注册程序,一个是序列号生成程序,你可以对照学习一下。注册程序可能有少许错误,不过修正方法应该很简单。-This is the VB method the use of encryption software to verify the serial number example, the relatively non-encrypted serial number, of cour
nofour
- 这个程序是用VB编写的,主要是用在智能卡方面特别多。如:客户要求的卡号中不需要哪些特定数字的卡号。此程序的实现功能就是排除不需要的数字,特别适合智能卡制作的工作人员使用。VB开发工具。-This process is the preparation of the VB is mainly used in smart cards and more particularly. Such as: the number of customers do not need the card number w
VB.Decompiler.Pro.v7.7.RETAIL.INCL.KEYGEN-FFF-[OYK
- P-Code decoding started and image extraction. Numerous bug fixes. Event detection added. Dll and OCX Support added. External Components added to vbp file. Begun work on a basic antidecompiler. Form property editor, complete with a
MD5Sample
- MD5加密的例子,可以通过这个程序了解VB进行MD5对于加密的处理方法。-MD5 encryption example, this procedure can be carried out to understand VB MD5 for encryption approach.
20117321274446
- 刚刚学vb 程序可能有点乱.... 本程序提供 字母表顺序加密、栅栏(2个一组)加密、摩斯电码加密、手机键盘加密、md5加密、凯撒加密(不成熟,bug比较多) 有什么建议的可以提出来,大家一起进步 -Just learning vb program may be a bit chaotic .... This procedure provides encryption alphabetical order, the fence (2 a) encryption, Morse cod
Encrypt
- VB替代加密法演示实例,输入密钥以及待加密字符串,就可得到最终的加密结果,程序并不复杂,有兴趣的可下载源码参考。-The demo instance of the VB alternative encryption method, enter the key string to be encrypted, you can get the final results of the encryption procedure is not complicated, who are interested