What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
资源简介:What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - the same technique can be implemented in "c" also.) Pr...
上传时间: 2013-12-25
上传用户:playboys0
资源简介:MCPU is a minimal cpu aimed to fit into a 32 Macrocell CPLD - one of the smallest available programmable logic devices. While this CPU is not powerful enough for real world applications it has proven itself as a valuable educational tool. t...
上传时间: 2017-03-11
上传用户:mikesering
资源简介:Visual tracking is one of the key components for robots to accomplish a given task in a dynamic environment, especially when independently moving objects are included. This paper proposes an extension of Adaptive Visual Servoing (hereaf...
上传时间: 2013-12-11
上传用户:lizhen9880
资源简介:Commented (pt-br) source code of Joshi, one of the first viruses that infect executable files instead of boot sectors.
上传时间: 2014-01-12
上传用户:wanghui2438
资源简介:the Pages 2.0 specification is one of the most exciting Java Community Process releases of the year. Chances are you picked this book to learn more about the new features of 2.0. Or you may be interested in using for the first time in your ...
上传时间: 2017-08-02
上传用户:liglechongchong
资源简介:the subject which is to us propos¨¦ is as follows: calculation of the degr¨¦ d¡ ¯ inconsistance d¡ ¯ un logical program possibilist in C++. We thus work on a logical program possibilist, it be-¨¤-statement ...
上传时间: 2013-12-18
上传用户:yulg
资源简介:the Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a No...
上传时间: 2015-06-30
上传用户:zyt
资源简介:the Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a No...
上传时间: 2015-07-26
上传用户:mpquest
资源简介:FileTimeSpy: Often times you may need to touch a file by setting its Created, Modified or Last Accessed date and time. This sample shows how to do it.
上传时间: 2013-12-16
上传用户:zxc23456789
资源简介:Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 the Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to...
上传时间: 2017-06-06
上传用户:songyue1991
资源简介:One of the most important issues affecting the implementation of microcontroller software deals with the data-decision algorithm. Data-decision refers to decoding the DIO-pin from the CC400/CC900. Two main principles exist for decoding...
上传时间: 2013-12-18
上传用户:671145514
资源简介:JBoss, one of the leading java Open Source groups, integrates and develops these services for a full J2EE-based implementation. JBoss provides JBossServer, the basic EJB container, and Java Manage Preface 18 Great Events of the Twentieth Ce...
上传时间: 2014-11-03
上传用户:wsf950131
资源简介:This zip describes a loop-back USB device port with one of the USB host ports. Includes main.html file for help.
上传时间: 2013-11-27
上传用户:Divine
资源简介:one of the linux gd libraries
上传时间: 2015-05-28
上传用户:啊飒飒大师的
资源简介:pop3代理服务器源代码One of the most powerful features of Pop3 Agent is a naive Bayes filter, that is capable of recognizing spam e-mails after appropriate training. Pop3 Agent uses an embedded Firebird database server. Of course, you ca...
上传时间: 2014-01-10
上传用户:yoleeson
资源简介:performs one of the matrix-vector operations y := alpha*A*x + beta*y, or y := alpha*A *x + beta*y, where alpha and beta are scalars, x and y are vectors and A is an m by n matrix
上传时间: 2014-08-17
上传用户:qlpqlq
资源简介:One of the most beautiful pictorial
上传时间: 2014-01-05
上传用户:cylnpy
资源简介:HDOJ 1047 One of the first users of BIT s new supercomputer was Chip Diller. He extended his exploration of powers of 3 to go from 0 to 333 and he explored taking various sums of those numbers. ``This supercomputer is great, remarked Chi...
上传时间: 2013-12-22
上传用户:黑漆漆
资源简介:Ajax, the popular term for Asynchronous JavaScript and XML, is one of the most important combinations of technologies for web developers to know these days. With its rich grouping of technologies, Ajax developers can create interactive web ...
上传时间: 2015-11-20
上传用户:qazxsw
资源简介:JVT-S203 contains the JSVM 6 reference software. It corresponds to CVS tag “JSVM_5_12_1”. For obtaining future versions of the software, the CVS server can be accessed using any CVS client. the server is configured to allow read access...
上传时间: 2016-02-01
上传用户:wangzhen1990
资源简介:JavaBeans is one of the most important developments in Java™ since its inception. It is Java s component architecture, which allows components built with Java to be used in graphical programming environments.
上传时间: 2016-02-01
上传用户:从此走出阴霾
资源简介:web chat , which is one of the famous module of openfire. deploy on the web.
上传时间: 2014-01-15
上传用户:二驱蚊器
资源简介:电力系统暂态分析实例 One of the main uses of SimPowerSystems is to simulate transients in electrical circuits
上传时间: 2016-07-14
上传用户:a3318966
资源简介:Shape registration by shape context: algorithm implemented by matlab and the paper. One of the best point matching algorithm after 2000.
上传时间: 2016-10-20
上传用户:1583060504
资源简介:Grass 5.00 start for idiot, one of the best documentation for Grass beginner users. And this is the Chinese edition, for the ones prefer mother language. From the beginning for Linux participation to the BIOS update, and finally the details...
上传时间: 2016-12-06
上传用户:jjj0202
资源简介:the Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional ...
上传时间: 2017-02-11
上传用户:moshushi0009
资源简介:allows the user to select files containing objects and draw them using one of the available projections.
上传时间: 2013-12-28
上传用户:zhangyi99104144
资源简介:For a programming language, Fortran has been around a long time. It was one of the first widely used 鈥渉igh-level鈥?languages, as well as the first programming language to be standardized. It is still the premier language for scientific...
上传时间: 2014-01-04
上传用户:6546544
资源简介:Learn to model various modern communication systems with this book from one of the world s leading authors in communications, John G. Proakis. A very helpful reference to MATLAB users of various levels
上传时间: 2017-05-07
上传用户:jing911003
资源简介:the world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-cr...
上传时间: 2017-05-14
上传用户:thuyenvinh