自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

Flyinsky1的专栏

生前何必久睡,死后自会长眠!

  • 博客(5)
  • 资源 (7)
  • 收藏
  • 关注

转载 Win7延长激活时间方法(微软官方文档)

1、首先安装后,有一个30天的使用期。2、在30天试用期即将结束时,用rearm命令后重启电脑,剩余时间又回复到30天。中声明该命令只能重复使用3次,也说是说总共可以免费体验120天。方法如下:打开附件—–命令提示符。(注意要使用右键管理员方式运行)。在命令行中输入“slmgr.vbs/rearm”的命令延长使用期30天重启系统后,又恢复到30天。3、上面的方法3次后,共计

2012-01-23 11:41:48 4099 1

原创 选择最好的数字签名解决方案的十个技巧(对应Ten Tips for ...英文文章)

选择最好的数字签名解决方案的十个技巧避免从纸质媒体(签名)到电子签名(文档)转变的时候出现意想不到的困难作者:JohnMarchioni 2007年9月译者:林永祥(Flyinsky1)引言随着传统的"基于纸张"

2009-06-02 16:19:00 1990

翻译 Ten Tips for Selecting the Best Digital Signature Solution

<!-- /* Style Definitions */ table.MsoNormalTable {mso-style-name:普通表格; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-a

2009-06-02 16:12:00 1388

转载 500封书信的神奇力量

   在台湾,他曾是一位“威名”赫赫的人物。从打架斗殴到加入黑社会竹联帮,偷盗、抢劫、勒索、敲诈,开赌场、开应召女郎站等等,无恶不作。他一人就曾持有美国、意大利产的各种名牌手枪6把,甚至,还有就连黑道上也为数不多的狙击步枪。他曾被警方悬赏30万元新台币而通缉,从19岁开始坐牢,一直坐到26岁。台湾有30多所监狱,他先后呆过14所,其中包括台湾东海面上著名的绿岛监狱。由于多次的逃脱和被抓

2009-05-27 14:39:00 738

原创 SWT+bcprov-jdk14-136

 用swt做个一个东西,至于为什么叫东西,是因为还有些内容没有完成。全部代码如下:package com;import java.io.BufferedReader;import java.io.ByteArrayOutputStream;import java.io.File;import java.io.FileInputStream;import java.io.Fi

2009-04-14 19:49:00 2507

WIN7及vista语言包安装工具Vistalizator

用于vista,Win7所有版本更改桌面界面,可更改中文版至诸如英文版,中文繁体版,日文版等多个国家语言版本。 http://www.technize.net/windows-7-sp1-language-packs-direct-download-links-kb2483139/

2012-08-10

dotnet反编译reflector.zip

Reflector是一个类浏览,分析器,同时它还是一个.net源文件查看器.Reflector支持简单地浏览,定位,搜索,反编译用C#,VB和中间语言写成的编译文件(dll). 来源于:Red Gate Software

2009-05-11

Prentice.Hall_-_Cryptography.and.Network.Security.4th.Edition.Nov.2005

Prentice.Hall_-_Cryptography.and.Network.Security.4th.Edition.Nov.2005.rar

2009-04-11

CSS2.0帮助文档

本《协议》授予您下列权利:您可以安装、使用、访问、显示、运行本作品。您可以保留多份副本,可以自由传播本作品。   上述权利不适用于您的任何商业行为或商业用途。否则您务必与苏昱联系。 谁是苏昱?自己见文档作者介绍..

2009-04-02

Secure Hash Standard

NIST网站: Federal Information Processing Standards Publication 180-2 2002 August 1 Announcing the SECURE HASH STANDARD Table Of Contents 1. INTRODUCTION .............................................................................................................................................................3 2. DEFINITIONS....................................................................................................................................................................4 2.1 GLOSSARY OF TERMS AND ACRONYMS....................................................................................................................4 2.2 ALGORITHM PARAMETERS, SYMBOLS, AND TERMS...............................................................................................4 2.2.1 Parameters.......................................................................................................................................................4 2.2.2 Symbols.............................................................................................................................................................5 3. NOTATION AND CONVENTIONS............................................................................................................................6 3.1 BIT STRINGS AND INTEGERS......................................................................................................................................6 3.2 OPERATIONS ON WORDS............................................................................................................................................7 4. FUNCTIONS AND CONSTANTS................................................................................................................................9 4.1 FUNCTIONS...................................................................................................................................................................9 4.1.1 SHA-1 Functions.............................................................................................................................................9 4.1.2 SHA-256 Functions........................................................................................................................................9 4.1.3 SHA-384 and SHA-512 Functions................................................................................................................9 4.2 CONSTANTS................................................................................................................................................................ 10 4.2.1 SHA-1 Constants...........................................................................................................................................10 4.2.2 SHA-256 Constants ......................................................................................................................................10 4.2.3 SHA-384 and SHA-512 Constants..............................................................................................................10 5. PREPROCESSING.........................................................................................................................................................12 5.1 PADDING THE MESSAGE ........................................................................................................................................... 12 5.1.1 SHA-1 and SHA-256.....................................................................................................................................12 5.1.2 SHA-384 and SHA-512................................................................................................................................12 5.2 PARSING THE PADDED MESSAGE ............................................................................................................................. 13 5.2.1 SHA-1 and SHA-256.....................................................................................................................................13 5.2.2 SHA-384 and SHA-512................................................................................................................................13 5.3 SETTING THE INITIAL HASH VALUE (H(0)).............................................................................................................. 13 5.3.1 SHA-1..............................................................................................................................................................13 5.3.2 SHA-256 .........................................................................................................................................................13 5.3.3 SHA-384 .........................................................................................................................................................14 5.3.4 SHA-512 .........................................................................................................................................................14 6. SECURE HASH ALGORITHMS ...............................................................................................................................15 6.1 SHA-1......................................................................................................................................................................... 15 6.1.1 SHA-1 Preprocessing...................................................................................................................................15 6.1.2 SHA-1 Hash Computation...........................................................................................................................15 6.1.3 Alternate Method for Computing a SHA-1 Message Digest...................................................................17 2 6.2 SHA-256..................................................................................................................................................................... 18 6.2.1 SHA-256 Preprocessing...............................................................................................................................19 6.2.2 SHA-256 Hash Computation.......................................................................................................................19 6.3 SHA-512..................................................................................................................................................................... 20 6.3.1 SHA-512 Preprocessing...............................................................................................................................21 6.3.2 SHA-512 Hash Computation.......................................................................................................................21 6.4 SHA-384..................................................................................................................................................................... 22 APPENDIX A: SHA-1 EXAMPLES ...................................................................................................................................25 A.1 SHA-1 EXAMPLE (ONE-BLOCK MESSAGE) ........................................................................................................... 25 A.2 SHA-1 EXAMPLE (MULTI-BLOCK MESSAGE) ....................................................................................................... 27 A.3 SHA-1 EXAMPLE (LONG MESSAGE) ....................................................................................................................... 32 APPENDIX B: SHA-256 EXAMPLES ...............................................................................................................................33 B.1 SHA-256 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 33 B.2 SHA-256 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 35 B.3 SHA-256 EXAMPLE (LONG MESSAGE)................................................................................................................... 40 APPENDIX C: SHA-512 EXAMPLES ...............................................................................................................................41 C.1 SHA-512 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 41 C.2 SHA-512 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 46 C.3 SHA-512 EXAMPLE (LONG MESSAGE)................................................................................................................... 55 APPENDIX D: SHA-384 EXAMPLES ..........................................................................................................................56 D.1 SHA-384 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 56 D.2 SHA-384 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 61 D.3 SHA-384 EXAMPLE (LONG MESSAGE)................................................................................................................... 70 APPENDIX E: REFERENCES............................................................................................................................................71

2009-04-02

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除