文件名称:TCExplorer_src
介绍说明--下载内容均来自于网络,请自行研究使用
TrueCrypt is a free open-source disk encryption software. It is able to create a virtual encrypted disk within a file and mounts it as a real disk. The encryption is automatic, real-time (on-the-fly) and transparent. However, a major disadvantage of TrueCrypt and all other on-the-fly encryption software is the requirement of administrative privileges on the computers where they are used. Thus they will not be usable in places such as public libraries and internet cafes, where the computers are typically locked down and the users are given only limited privileges.-TrueCrypt is a free open-source disk encryption software. It is able to create a virtual encrypted disk within a file and mounts it as a real disk. The encryption is automatic, real-time (on-the-fly) and transparent. However , a major disadvantage of TrueCrypt and all other on-the-fly encryption software is the requirement of administrative privileges on the computers where they are used. Thus they will not be usable in places such as public libraries and internet cafes, where the computers are typically locked down and the users are given only limited privileges.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
TCExplorer
..........\crypto.cpp
..........\crypto.h
..........\filesys
..........\.......\fat
..........\.......\...\bit_ops.h
..........\.......\...\cache.cpp
..........\.......\...\cache.h
..........\.......\...\common.cpp
..........\.......\...\common.h
..........\.......\...\directory.cpp
..........\.......\...\directory.h
..........\.......\...\disc.cpp
..........\.......\...\disc.h
..........\.......\...\fatdir.cpp
..........\.......\...\fatdir.h
..........\.......\...\fatfile.cpp
..........\.......\...\fatfile.h
..........\.......\...\filetime.cpp
..........\.......\...\filetime.h
..........\.......\...\file_allocation_table.cpp
..........\.......\...\file_allocation_table.h
..........\.......\...\license_libfat.txt
..........\.......\...\mem_allocate.h
..........\.......\...\partition.cpp
..........\.......\...\partition.h
..........\.......\filesys.h
..........\icon.xpm
..........\LibTomCrypt
..........\...........\headers
..........\...........\.......\tomcrypt.h
..........\...........\.......\tomcrypt_argchk.h
..........\...........\.......\tomcrypt_cfg.h
..........\...........\.......\tomcrypt_cipher.h
..........\...........\.......\tomcrypt_custom.h
..........\...........\.......\tomcrypt_hash.h
..........\...........\.......\tomcrypt_mac.h
..........\...........\.......\tomcrypt_macros.h
..........\...........\.......\tomcrypt_math.h
..........\...........\.......\tomcrypt_misc.h
..........\...........\.......\tomcrypt_pk.h
..........\...........\.......\tomcrypt_pkcs.h
..........\...........\.......\tomcrypt_prng.h
..........\...........\LibTomCrypt.cbp
..........\...........\LibTomCrypt.depend
..........\...........\LibTomCrypt.layout
..........\...........\LICENSE
..........\...........\license_LibTomCrypt.txt
..........\...........\ReadMe.txt
..........\...........\src
..........\...........\...\ciphers
..........\...........\...\.......\aes
..........\...........\...\.......\...\aes.c
..........\...........\...\.......\...\aes_tab.c
..........\...........\...\.......\anubis.c
..........\...........\...\.......\blowfish.c
..........\...........\...\.......\cast5.c
..........\...........\...\.......\des.c
..........\...........\...\.......\khazad.c
..........\...........\...\.......\noekeon.c
..........\...........\...\.......\rc2.c
..........\...........\...\.......\rc5.c
..........\...........\...\.......\rc6.c
..........\...........\...\.......\safer
..........\...........\...\.......\.....\safer.c
..........\...........\...\.......\.....\saferp.c
..........\...........\...\.......\.....\safer_tab.c
..........\...........\...\.......\serpent.c
..........\...........\...\.......\skipjack.c
..........\...........\...\.......\twofish
..........\...........\...\.......\.......\twofish.c
..........\...........\...\.......\.......\twofish_tab.c
..........\...........\...\.......\xtea.c
..........\...........\...\encauth
..........\...........\...\.......\ccm
..........\...........\...\.......\...\ccm_memory.c
..........\...........\...\.......\...\ccm_test.c
..........\...........\...\.......\eax
..........\...........\...\.......\...\eax_addheader.c
..........\...........\...\.......\...\eax_decrypt.c
..........\...........\...\.......\...\eax_decrypt_verify_memory.c
..........\...........\...\.......\...\eax_done.c
..........\...........\...\.......\...\eax_encrypt.c
..........\...........\...\.......\...\eax_encrypt_authenticate_memory.c
..........\...........\...\.......\...\eax_init.c
..........\...........\...\.......\...\eax_test.c
..........\...........\...\.......\gcm
..........\...........\...\.......\...\gcm_add_aad.c
..........\...........\...\.......\...\gcm_add_iv.c
..........\...........\...\.......\...\gcm_done.c
..........\...........\...\.......\...\gcm_gf_mult.c
..........\...........\...\.......\...\gcm_init.c
..........\...........\...\.......\...\gcm_memory.c
..........\...........\...\.......\...\gcm_mult_h.c
..........\...........\...\.......\...\gcm_process.c
..........\...........\...\.......\...\gcm_reset.c
..........\...........\...\.......\...\gcm_test.c
..........\...........
..........\crypto.cpp
..........\crypto.h
..........\filesys
..........\.......\fat
..........\.......\...\bit_ops.h
..........\.......\...\cache.cpp
..........\.......\...\cache.h
..........\.......\...\common.cpp
..........\.......\...\common.h
..........\.......\...\directory.cpp
..........\.......\...\directory.h
..........\.......\...\disc.cpp
..........\.......\...\disc.h
..........\.......\...\fatdir.cpp
..........\.......\...\fatdir.h
..........\.......\...\fatfile.cpp
..........\.......\...\fatfile.h
..........\.......\...\filetime.cpp
..........\.......\...\filetime.h
..........\.......\...\file_allocation_table.cpp
..........\.......\...\file_allocation_table.h
..........\.......\...\license_libfat.txt
..........\.......\...\mem_allocate.h
..........\.......\...\partition.cpp
..........\.......\...\partition.h
..........\.......\filesys.h
..........\icon.xpm
..........\LibTomCrypt
..........\...........\headers
..........\...........\.......\tomcrypt.h
..........\...........\.......\tomcrypt_argchk.h
..........\...........\.......\tomcrypt_cfg.h
..........\...........\.......\tomcrypt_cipher.h
..........\...........\.......\tomcrypt_custom.h
..........\...........\.......\tomcrypt_hash.h
..........\...........\.......\tomcrypt_mac.h
..........\...........\.......\tomcrypt_macros.h
..........\...........\.......\tomcrypt_math.h
..........\...........\.......\tomcrypt_misc.h
..........\...........\.......\tomcrypt_pk.h
..........\...........\.......\tomcrypt_pkcs.h
..........\...........\.......\tomcrypt_prng.h
..........\...........\LibTomCrypt.cbp
..........\...........\LibTomCrypt.depend
..........\...........\LibTomCrypt.layout
..........\...........\LICENSE
..........\...........\license_LibTomCrypt.txt
..........\...........\ReadMe.txt
..........\...........\src
..........\...........\...\ciphers
..........\...........\...\.......\aes
..........\...........\...\.......\...\aes.c
..........\...........\...\.......\...\aes_tab.c
..........\...........\...\.......\anubis.c
..........\...........\...\.......\blowfish.c
..........\...........\...\.......\cast5.c
..........\...........\...\.......\des.c
..........\...........\...\.......\khazad.c
..........\...........\...\.......\noekeon.c
..........\...........\...\.......\rc2.c
..........\...........\...\.......\rc5.c
..........\...........\...\.......\rc6.c
..........\...........\...\.......\safer
..........\...........\...\.......\.....\safer.c
..........\...........\...\.......\.....\saferp.c
..........\...........\...\.......\.....\safer_tab.c
..........\...........\...\.......\serpent.c
..........\...........\...\.......\skipjack.c
..........\...........\...\.......\twofish
..........\...........\...\.......\.......\twofish.c
..........\...........\...\.......\.......\twofish_tab.c
..........\...........\...\.......\xtea.c
..........\...........\...\encauth
..........\...........\...\.......\ccm
..........\...........\...\.......\...\ccm_memory.c
..........\...........\...\.......\...\ccm_test.c
..........\...........\...\.......\eax
..........\...........\...\.......\...\eax_addheader.c
..........\...........\...\.......\...\eax_decrypt.c
..........\...........\...\.......\...\eax_decrypt_verify_memory.c
..........\...........\...\.......\...\eax_done.c
..........\...........\...\.......\...\eax_encrypt.c
..........\...........\...\.......\...\eax_encrypt_authenticate_memory.c
..........\...........\...\.......\...\eax_init.c
..........\...........\...\.......\...\eax_test.c
..........\...........\...\.......\gcm
..........\...........\...\.......\...\gcm_add_aad.c
..........\...........\...\.......\...\gcm_add_iv.c
..........\...........\...\.......\...\gcm_done.c
..........\...........\...\.......\...\gcm_gf_mult.c
..........\...........\...\.......\...\gcm_init.c
..........\...........\...\.......\...\gcm_memory.c
..........\...........\...\.......\...\gcm_mult_h.c
..........\...........\...\.......\...\gcm_process.c
..........\...........\...\.......\...\gcm_reset.c
..........\...........\...\.......\...\gcm_test.c
..........\...........