文件名称:jm-c
- 所属分类:
- Internet/网络编程
- 资源属性:
- [Text]
- 上传时间:
- 2012-11-26
- 文件大小:
- 1kb
- 下载次数:
- 0次
- 提 供 者:
- e**
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
转载,给文件加密的技术很多,其中又分为不同等级,以适合不同场合的需要.这里给出最简单的文件加密技术,即采用文件逐字节与密码异或方式对文件进行加密,当解密时,只需再运行一遍加密程序即可.
下面是一个实例程序,能对任意一个文件进行加密,密码要求用户输入,限8位以内(当然你可以再更改).程序有很好的容错设计,这是我们应该学习的.-reproduced for file encryption technologies lot, which will be divided into different levels, to suit the needs of different occasions. Here is the most simple file encryption technology, which adopts a case-by-byte file with the password or different ways to document encryption, decryption, only re-running again can be encrypted . Below is a sample program that can be an arbitrary document to be encrypted, password request user input limit within eight (of course you can change). procedures have a good fault-tolerant design, that is what we should learn.
下面是一个实例程序,能对任意一个文件进行加密,密码要求用户输入,限8位以内(当然你可以再更改).程序有很好的容错设计,这是我们应该学习的.-reproduced for file encryption technologies lot, which will be divided into different levels, to suit the needs of different occasions. Here is the most simple file encryption technology, which adopts a case-by-byte file with the password or different ways to document encryption, decryption, only re-running again can be encrypted . Below is a sample program that can be an arbitrary document to be encrypted, password request user input limit within eight (of course you can change). procedures have a good fault-tolerant design, that is what we should learn.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
jm.txt