资源列表
tfn2k.tgz
- 进行DoS攻击的高效工具
vfp加密与解密
- 一个简单实用的数据加密程序,在我们生活中重要数据比如身份验证,采用明文存取,很容易被别人窃取,而先采用加密后再存入数据库,用的时候再还原,这样就保证了数据安全性.-a simple and practical data encryption procedures, in our lives important information such as authentication, access expressly adopted, it is easy for others to steal,
SMBCrack
- 使用暴力法破解Windows共享密码的源代码,密码可来自字典、生日或字符及其组合,多线程设计,可同时破解多个不同的共享资源。
奇迹C1 C2 C3 C4协议加密与解密
- 奇迹C1 C2 C3 C4协议加密与解密-MU C1 C2 C3 C4 encrypt and decrypt
CRC_matlab.CRC校验的Matlab仿真
- CRC校验的Matlab仿真,也可以认为是二进制除法。,CRC checksum of the Matlab simulation, it can be regarded as a binary division.
MD5.rar
- md5加密解密算法;里面自带pb例程;希望对大家有用,md5 encryption and decryption algorithm there own routines pb useful for all of us hope
BUCK
- BUCK的matlab模型,在连续电流模式下,改变占空比,改变输出电压-BUCK' s matlab model, in the continuous current mode, changing the duty cycle, change the output voltage
java_watermark
- 用java实现数字水印的嵌入与提取,过程中使用DES对水印进行加密-Java digital watermark embedding and extraction, the process of using DES to encrypt the watermark
qnfb
- 千年封包截取,内有源码,且有封包格式等的详细说明-1000y
易语言源码密码暴力破解器
- 易语言源码密码暴力破解器 可以破解易语言加的密码-Easy language source code is available brute force crack the password plus easy language
Lab2-2
- 作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。-As communication between the parties A and B have shared a session master key Km. Upon completion of the distribution of session key Ks, A-Ks f
8-5
- 有一种加密方法为:其使用一个字母串(可以含重复字母,字母个数不超过50)作为密钥。假定密钥单词串为feather,则先去掉密钥单词中的重复字母得到单词串feathr,然后再将字母表中的其它字母以反序追加到feathr的后面-There is an encryption method: its use a string of letters (which can contain repeated letters, the number of not more than 50 letters) as