搜索资源列表
EncodingandDecoding
- 本书讲述Windows环境下的加密与解密技术。这本书采用循序渐进方式, 从基本的跟踪调试到深层的拆解脱壳,从浅显的注册码分析到商用软件保 护,这500多页的一部书,几乎囊括了Windows下的软件保护的绝大多数内 容。-book on the environment of Windows encryption and decryption technology. This book step-by-step approach, from basic to the deep track
crack
- 你是不是经常到处找破解资料,转了一大圈,也找不全,多么希望找一完整破解教程,从简到深,系统学习破解知识。本人就有这一体会,为了使大家更快掌握这门技术,特将本人长期收集资料和破解经验总结一篇教程,相信对大家有所帮助。这份资料主要是和大家探讨一些加密解密的问题,在文中引用了不少平时收集的资料,但均保持文章原样。 -You are not always looking to break the information to a large circle, but also look for inc
DESRSA
- 通过用DES算法对实际的数据进行加密和解密来深刻了解DES的运行原理-DES algorithm by using the actual data encryption and decryption to a deep understanding of the operation principle of DES
mima
- 密码分析学(冯登国)。北大密码学教案资料,分析透彻,由浅入深,搞软件的建议-North cryptography lesson plan information, analysis and thorough, Deep and
File-encryption-(decryption)
- 简单文件加密(解密)程序 , 用C语言写的一个,学的不深,请多多指教-Simple file encryption (decryption) process, written in C language, one school is not deep, please exhibitions
week3-notes
- Weakest link” is size of key Attacks take advantage of encryption speed 1993: Weiner: $1M machine, 3.5 hours 1998: EFF’s Deep Crack: $250,000 92 billion keys per second 4 days on average 1999: distributed.net: 23 hours OK for some things
anti_ollydbg
- 针对OLLYDBG的防止反汇编措施,也可以对变化的Ollydbg进行深层ANTI-In view of the measures to prevent the disassembly OLLYDBG, also can undertake deep ANTI OLLYDBG of change