账号:
密码:
鯧뎅꿥ꆱ藥 27
CTimes零组件杂志第228期(2010年10月号) (2010.11.08)
汽车内燃机引擎整整风光了100年。但随着油价飙涨,环保意识抬头,全世界都积极抢进电动车,直接促使汽车产业展开二次革命。究竟电动车的关键技术何在?台湾业者发展电动车有哪些优势?当石油世纪走到尾声
自动加密及解密的软件工具,支持密码保护、安全钥、公共密钥与私人密钥等-AutoKrypt 9.03 (2010.09.30)
自动加密及解密的软件工具,支持密码保护、安全钥、公共密钥与私人密钥等
Android威脅iPhone 蘋果祭出專利訴訟手段 (2010.05.10)
Android威脅iPhone 蘋果祭出專利訴訟手段
Google綠能投資 首購風力發電廠 (2010.05.05)
Google綠能投資 首購風力發電廠
-Powered Keylogger 2.3.2.2020 (2008.12.09)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-keyvil v.0.01 (2008.06.26)
a number of clients try to find a secret key by calculating the encryptions to all possible keys of a given key range and comparing them to the encryptin of the secret key until a matching one is detected....
实现完整的近距离无线通信体系 (2008.01.30)
近年来,相关产业的重要技术厂商已针对行动付费以及其它NFC新应用,共同发展出许多标准和解决方案。到目前为止,这些业者针对行动付费的发展重点在于手机内部功能和新出现的NFC标准
-Powered Keylogger 2.2 (2007.11.03)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 2.1 (2007.05.26)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 2.0 (2007.02.03)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 1.60 (2006.08.26)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
扩大小型记忆卡新兴应用领域 (2006.07.06)
媒体公司与服务供货商正在寻找一种系统,不只能支持在储存卡预录付费内容,还能安全简便地下载及租用内容。并让客户在各种不同装置之间分享授权内容,但没有有非法复制与分享档案的风险
-Powered Keylogger 1.4 (2006.01.15)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Top Secret Crypto Gold 4.10.000 (2005.08.09)
Top Secret Crypto, a file and e-mail encryption program, maintains your communications privacy over the Internet. It incorporates RSA public key cryptography which uses the One Time Pad Encryption System as its conventional encryption algorithm
-Powered Keylogger 1.35 (2005.07.30)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
促进WLAN安全防护之简易网路​​设定方法 (2005.07.05)
随着市场出现了带来安全且容易使用的通讯协定,使用者现在能享受目前业界最佳的安全防护。本文将探讨WLAN的安全性,并介绍目前的网路威胁以及可用的通讯协定,然后再以一个市场上的解决方案为例,说明​​使用者也能轻松解决这些威胁
-Powered Keylogger 1.30 (2005.03.19)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Top Secret Crypto Gold 4.00.000 (2005.03.09)
Top Secret Crypto, a file and e-mail encryption program, maintains your communications privacy over the Internet. It incorporates RSA public key cryptography which uses the One Time Pad Encryption System as its conventional encryption algorithm
掌握消费特性 决胜DC市场 (2004.08.04)
Dan Vivoli认为,唯有深入分析并掌握市场上数字产品主流使用群之消费特性,才能研发更具竞争力的产品,并在生活数字化、数字生活化的DC市场趋势里事半功倍、日进千里
掌握消费特性 决胜DC市场 (2004.08.03)
Dan Vivoli认为,唯有深入分析并掌握市场上数位产品主流使用群之消费特性,才能研发更具竞争力的产品,并在生活数位化、数位生活化的DC市场趋势里事半功倍、日进千里


     [1]  2   [下一頁]

  跥Ꞥ菧ꢗ雦뮗
1 安立知扩展Inline感测器系列 推出低频峰值功率感测器MA24103A
2 明纬推出XLN/XLC系列:25W/40W/60W智能调光LED驱动电源
3 恩智浦新型互联MCX W无线MCU系列适用於智慧工业和物联网装置
4 u-blox新推两款精巧型模组内建最新Nordic蓝牙晶片
5 Microchip推出搭配Kudelski IoT keySTREAM的ECC608 TrustMANAGER
6 安勤专为工业和通信领域推出ECM-ASL 3.5寸嵌入式单板电脑
7 igus推出轻量化ReBeL协作机器人仿生手
8 凌华搭载Intel Amston-Lake模组化电脑适用於强固型边缘解决方案
9 ROHM新增3款6432尺寸金属板分流电阻PMR100系列产品
10 皮尔磁全新PIT oe ETH元件具备可启用乙太网路连接埠护资安

AD

刊登廣告 新聞信箱 读者信箱 著作權聲明 隱私權聲明 本站介紹

Copyright ©1999-2024 远播信息股份有限公司版权所有 Powered by O3
地址:台北市中山北路三段29号11楼 / 电话 (02)2585-5526 / E-Mail: webmaster@ctimes.com.tw