Source Code Online Home Categories Top Code New Code Submit Code
Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
Fashmark 3.0
NCrypted Etsy Clone 3.0
Biometric Handpunch Manager Professional 7.21.17
OLX Clone Script 3.0
Poshmark Clone 3.0
Joyfax Broadcast 7.85.0421
NCrypted Fiverr Clone 3.0
JavaScript Webix Menu 1.7
NCrypted Gumtree Clone 3.0
Nigg – Digg Clone 3.0
JavaScript and HTML5 Webix Charts 1.7
Bookitt – A Powerful Bookmark website Reddit Clone 3.0
phpFox Chat Module 3.7 3.7
PHPtravels 2.0
VISCOM TIFF Viewer ActiveX SDK 11.06
Top Code
Theater Management Software 1.0.4
Inout Support Desk Manager 1.0
dbExpress Driver for PostgreSQL 3.3
dbForge Fusion for Oracle 3.5
Thumbtack Clone 1.0b2
Furon 1.0
Automated Scheduler and Alert System 1.0
Edutella - a P2P network for RDF data 1.0
FJSP Software 1.0
sourcecode2html 0.0.1
DrupalChat 7.x-1.0-beta0
HTML2Book 6.x-1.0
PHPNuke Text Ads Module 1.0
List of references 1.0
Simple Website System 0.7.2
Top Search
Photo Add Comment Php
Source Code Of Add Comment In Php
Login Page Code Using Html
Mini Projects On Computer Graphics Using Opengl
Movistar Planet
Thrisha Bathroom Video Without Dress Free Download
Asp Net Projects With Free Source Code
File Anti Leechcachedyou
Login Page Code Using Jsp
Carpooling Website Php
Cms Vimp In Centos
Dirty Word
Zesium Mobile Pdf Reader Activation Code
Php Flatfile Gallery
Search Within Website In Php
Related Search
Serpent Encryption Algorithm In Java
Serpent Encryption Algorithm
Encryption Algorithm In Aspnet
Aes Encryption Algorithm
Direct C Program For Des Encryption Algorithm
International Data Encryption Algorithm In Vbnet
Two Fish Encryption Algorithm
International Data Encryption Algorithm
rc5 Encryption Algorithm
Two Way Encryption Algorithm
The Proposed Image Encryption Algorithm
Coding For Php Rsa Encryption Algorithm
Des Encryption Algorithm
md5 Encryption Algorithm Source Code
International Data Encryption Algorithm In C
 Serpent Encryption Algorithm 

Code 21-40 of 60   Pages: Go to  << Prior  1  2  3  Next >>  page  



Now a days in all Opensocial Networks they use a feature called "Invite Friends" where peoples can send multiple invitations to friends. The social networks accesses all the email address of the people friends inorder to send invitation just by entering the peoples username and password of the respective mail servers eg. Gmail, Yahoo, MSN, AOL, Hotmail etcs. StesCodes presents the code to grab address contacts of Gmail, Yahoo, AOL,...



File Encryption is an useful article for the users to learn the method of encrypting the web application by using symmetric algorithm technique. The author discuuses about various classes that is offered by the .NET framework inorder to include it...



RC4 generates a pseudorandom stream of bits (a keystream) which, for encryption, is combined with the plaintext using bit-wise exclusive-or; decryption is performed the same way (since exclusive-or is a symmetric operation).

(see...



Semisecure Login Reimagined increases the security of the login process by using a combination of public and secret-key encryption to encrypt the password on the client-side when a user logs in. javascript is required to enable encryption. It is...







The Crypt library is a pure-ruby implementation of a number of popular encryption algorithms. Algorithms currently include Blowfish, GOST, IDEA, and Rijndael (AES). CBC has also been implemented. Twofish, Serpent, and CAST256 are planned for...



Using this powerful algorithm, users both in the Internet and Intranet can send the encrypted and decrypted data of any file size with one another. Only the users who know the encryption mechanism can decrypt the files. This tool generates...



DCPcrypt is an open source library of cryptographic components (encryption and hash algorithms). The idea behind DCPcrypt is that it should be possible to drop in any algorithm implementation to replace another with minimum or no code...



Chameleon allows you to hide files (all types of files), directory files by compressing (WinZip v1.0), encrypting (Double 128 bit Blowfish encryption fast algorithm (ASM)) on the fly, scrambling them and then attaching them to the host files of...



HsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. The library includes the following block and stream cipher modules:

* AES...



This module exposes primitives useful for executing Markov Encryption
processes. ME was inspired by a combination of Markov chains with the
puzzles of Sudoku. This implementation has undergone numerous changes
and optimizations...



Lightweight drop-in encryption wrapper for various Client/Server solutions supporting
protocols such as UDP, TCP, HTTP, HTTPS, FTP, RAW Sockets etc.



This is an evolutionary algorithm that returns a random list of prime numbers. This code is highly inefficient for a reason. This algorithm is more of a proof of concept that if a prime was a heritable trait, it would not be a desired one.



This is a pure Python implementation of the rsync algorithm. On my desktop (3.0GHz dual core, 7200RPM), best case throughput for target file hash generation and delta generation is around 2.9MB/s. Absolute worst case scenario (no blocks in common)...



A-star (A*) Shortest Path Algorithm



Dijkstra shortest path algorithm.



Encryption can sometimes be a nightmare, at least is my experience while Python has
some excellent resources for encryption I found myself a lot of times needing an
encryption solution that could port easily between VS C++, .NET, PHP,...



File encryption/decryption using stream cipher.
It can encrypt/decrypt any type of file.



Floyd-Steinberg dithering is an image dithering algorithm (see http://en.wikipedia.org/wiki/Floyd-Steinberg for more details). While the algorithm is mainly for image manipulation, I use it to create random locations for sensor networt devices.



This is a simple implementation of the famous LZW algorithm.



this algorithm predicts the received signal strength for the mobile user to avoid fluctuation in received signal strength during localization of the mobile user(finding mobile user's location)