-
数据库安全至关重要,尤其是Access数据库,由于其加密算法过于简单,使得Access单靠密码无法保证其安全,本代码通过改变数据库头文件实现对Acess数据库的...
数据库安全至关重要,尤其是Access数据库,由于其加密算法过于简单,使得Access单靠密码无法保证其安全,本代码通过改变数据库头文件实现对Acess数据库的加密。-Database security is crucial, especially the Access database, because of its too simple encryption algorithm, making Access a password alone can not guarantee their safety, the code by changing the header file database achieve Acess database encryption.
- 2023-07-10 15:15:03下载
- 积分:1
-
RSA的加密代码,含MFC界面,功能强大,可支持任意长度密钥。...
RSA的加密代码,含MFC界面,功能强大,可支持任意长度密钥。-RSA" s encryption code with MFC interface, powerful, can support an arbitrary length of the key.
- 2022-08-07 12:16:26下载
- 积分:1
-
全功能的加密库,对称加密,非对称加密,单向加密,等待,最新版本...
全功能的加密库,对称加密,非对称加密,单向加密,等待,最新版本-Full-featured encryption library, symmetric encryption, asymmetric encryption, one-way encryption, to wait, the latest version
- 2022-01-26 07:04:58下载
- 积分:1
-
openssl-1.0.1g的VS工程
本压缩包为2014年4月7日OpenSSL发布的OpenSSL 1.0.1g的VS工程包,包含在VS下编译所需的所有文件,并在VS2008环境下进行了编译测试。
- 2023-01-30 11:30:06下载
- 积分:1
-
汇编内核的MD5算法C源码,核心运算部分采用汇编语言编写,执行高效。VC++环境开发,由于直接在C代码中直接嵌入汇编,因此可无须另外设置,可直接使用。...
汇编内核的MD5算法C源码,核心运算部分采用汇编语言编写,执行高效。VC++环境开发,由于直接在C代码中直接嵌入汇编,因此可无须另外设置,可直接使用。
- 2022-03-22 03:23:16下载
- 积分:1
-
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀-Hard drive protection locks, an absolute classic, researchers have looked hard disk encryption
- 2022-06-29 00:50:46下载
- 积分:1
-
AES Rijndael fast security system to encrypt and deycrypt information
AES Rijndael fast security system to encrypt and deycrypt information
- 2022-03-18 16:38:11下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
在位图文档中如何进行基本的信息隐藏
在位图文档中如何进行基本的信息隐藏-incumbent map document how the basic information hiding
- 2022-04-10 20:34:32下载
- 积分:1
-
运用通信例子,通过建立安全那么JSSE…
jsse使用范例,通过sokcet通讯建立安全数据传输-JSSE using the example of communication through the establishment of security Sokcet data transmission
- 2022-06-19 01:04:42下载
- 积分:1