资源列表
gost
- Gost加解密算法--The GOST 28147-89 cipher-Gost encryption algorithm -- The cipher GOST 28147-89
caphdisk
- 监控磁盘的可用空间,用于监视磁盘使用情况的程序-monitoring of the available disk space used for monitoring disk usage procedures
COMkongzhixitongsheji
- 控制系统com接口设计,程序适合初学com者,参考学习。内有程序功能设计说明,为了解程序提供帮助。可以运行。-control system interface design, programming suitable for beginners com, the reference to the study. Procedures within the functional design specifications, to provide help to understand the proc
DirectoryTreeView
- 一个文件夹浏览窗口的源程序,整个界面同Windows下的资源管理器中的文件夹浏览十分的相似-a folder browser window to the source, the entire Windows interface with the management of resources for the folder View is very similar to the
magmouse
- 放大鼠标移动到的区域 完成局部屏幕放大的功能-Click the mouse moved to the region to complete the partial screen enlargement function
Des(JAVA)
- 使用JAVA语言编写的Des加密解密源码,希望能给大家提供一些帮助.-use of the Java language source Des encryption and decryption, in the hope of giving you some help.
BiTreeExcise
- 二叉树的练习,先序输入,先序,中序,后序输出-binary tree exercises, first order input, first sequence, the sequence after sequence output
VBXITONGCIPAN
- VB代码 获得系统磁盘的属性 简明扼要! 很适合新手 -VB code access system disk attributes concise! Very suitable for novice! !
CMd5_Unicode
- 先前的md5_correct关于Unicode的说法不正确,此版本为验证过的真正支持Unicode的版本,修正了其他的小问题。注意文件格式仅支持ansi格式,其他格式的支持不是本类的重点。关键词:md5,CMd5,Unicode,hash-previous md5_correct on Unicode is not correct. This version tested for the genuine support of Unicode version, the amendment of o
88d70d57-e7e0-490b-8b8b-feb85c0bea3b
- VC托盘这个程序详细说明了如何使用VC编写出现在WINDOWS托盘中的程序- How has this procedure specify used VC to compile in the present WINDOWS tray the procedure ,Visual C++,界面编程/GUI Develop -VC pallet of this procedure a detailed descr iption of how to use the VC prepared appear
Encode.dll
- 文件加密算法,包括DES等等,其中有详细说明-document encryption algorithms, including DES, etc., which are described in detail
snort-2.6.1.1.tar
- Snort为国际上著名的轻量型入侵防御系统,为国内多家著名“自主知识产权”网络安全公司所使用。-Snort internationally famous light-invasion defense system, famous for many "intellectual property rights" Network security companies use.