-
-
XML_Rowset.zip
... as parameters:
DBService = SQL Server connection parameters, i.e.
“Data Source=XXX Initial Catalog=YYY Integrated Security=SSPI ”
ProcedureName = stored procedure, or query statement with parameter markers.
Parameters = NULL for no query parameters ...
-
-
Decrypt_encrypt.zip
This code to implement connnection with data base. This is mainly to decrypt and encrypt database contents. This for cryptography.(security)
-
-
-
cryptography.tar.gz
Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
-
FU_Lite.rar
... that it is
possible to subvert the view of virtual memory relied upon by the
operating system and almost all security scanner applications. Due to its
exploitation of the TLB architecture, Shadow Walker is transparent and
exhibits an extremely light ...
-
-
-
-