Search slax powered by PerlSoft.de Version powered by social book, 300 result(s) found

THE deBIAN ADMINISTRATOR'S HANDbook

2012-05-11 03:59    By:Lin      View:8      Download:0

About this project Written by two debian developers — Raphaël Hertzog and Roland Mas — the debian Administrator's Handbook started as a translation of their French best-seller known as Cahier de l'admin debian (published by Eyrolles). It's a fantastic resource for all users...

Linux HTML/CSS

de2 practice source 2-2

2014-12-01 08:24    By:jamiechoo      View:15      Download:0

2 the first part of the experiment FPGA de2 development boards VHDL hardware language source code Part II You are to design a circuit that converts a four-bit binary number V = v3v2v1v0 into its two-digit decimal equivalent D = d1d0. Table 1 shows the required output values. A par...

Embeded VHDL

delphi's Base64 encryption and decryption

2015-04-28 10:28    By:18005321790      View:42      Download:0

Indy components in the use of encryption string encryption support Chinese characters, not garbled. Has been tested on delphi2010, encrypted string can be guaranteed to be java through Base64 decryption....

Crypt_Decrypt algrithms Delphi

TComPort componente para delphi

2015-05-18 21:28    By:SANDRO      View:489      Download:0

Componente para comunicacao serial assincrono para delphi 7 - xe utilizando winapi, com thread, pego da pagina sourceforge.net, e colocado aqui para obter pontos....

Delphi Development Delphi

TS demux to the ES stream and ES packages to PES and TS

2015-05-18 05:48    By:macken      View:55      Download:2

TS demux to the ES stream and ES packages to PES and TS Good understanding of TS, ES, PES...

video C++

Shirodemo authority management tools

2015-05-07 08:10    By:cykyo123      View:33      Download:0

Shirodemo simple use case of Shiro. Shiro is the right management tool. Permission management can be controlled in several ways, here is a simple use case of Shiro....

Java Development Java

Data Encryption Standard (deS) Key Schedule

2015-04-27 00:43    By:mjordan1      View:48      Download:0

This code provides an implementation of the key schedule in Data Encryption Standard (deS), which is the algorithm that generates the sub-keys. • Input:  any string (64-bits length). • Output: the 16 sub-keys produced by the deS (48-bits length each). How to use it: 1. >> K...

Crypt_Decrypt algrithms Matlab

PHP deS Implementation

2015-04-12 15:16    By:interac      View:26      Download:1

encrypt using single deS (with an 8 byte key) in CBC mode with the given input vector and PKCS7 padding des ("8bytekey", "This is the message.", 1, 1, "inputvec", 1); encrypt using triple deS (with a 24 byte key) in ECB mode des ("this is a 24 byte key !!", "This is the message.", 1); decrypt u...

Crypt_Decrypt algrithms PHP

3deS,MAC algorithm for encryption and decryption tests source code

2015-05-13 09:40    By:easydeng      View:226      Download:2

3deS,MAC algorithm for encryption and decryption tests source code, suitable for beginners. MAC algorithm (Message Authentication Codes) keyed Hash functions: the hash value of the message is known by only two key k to control....

Crypt_Decrypt algrithms C

Introduction to nodeJS program

12 hours ago    By:poem~      View:38      Download:0

Introduction to nodeJS simplest programs, teach you an example, a product of Baidu using nodeJS statistical graphs, learn to nodeJS...

Java Development JavaScript

×

Login CodeForge

Don't have an account? Register now
Need any help?
Mail to: support@codeforge.com
×

Sorry, you don't have enough CF coins! ^_^|||

Fast channel (Get CF coins immediately):

10 CF coins (points) for $20.00 USD
22 CF coins (points) for$40.00USD
55 CF coins (points) for$100.00USD
120 CF coins (points) for$200.00USD
Free channel :

Submit your source codes
You could get 1-10 CF coins
More……
×

切换到中文版?

×

Where are you going?

×

Tips

This user hasn't enable blog!
×

Tips

Favorite by Ctrl+D