帳號:
密碼:
相關物件共 27
CTimes零組件雜誌第228期(2010年10月號) (2010.11.08)
汽車內燃機引擎整整風光了100年。但隨著油價飆漲,環保意識抬頭,全世界都積極搶進電動車,直接促使汽車產業展開二次革命。究竟電動車的關鍵技術何在?台灣業者發展電動車有哪些優勢?當石油世紀走到尾聲
自動加密及解密的軟體工具,支援密碼保護、安全鑰、公共密鑰與私人密鑰等-AutoKrypt 9.03 (2010.09.30)
自動加密及解密的軟體工具,支援密碼保護、安全鑰、公共密鑰與私人密鑰等
Android威脅iPhone 蘋果祭出專利訴訟手段 (2010.05.10)
Android威脅iPhone 蘋果祭出專利訴訟手段
Google綠能投資 首購風力發電廠 (2010.05.05)
Google綠能投資 首購風力發電廠
-Powered Keylogger 2.3.2.2020 (2008.12.09)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-keyvil v.0.01 (2008.06.26)
a number of clients try to find a secret key by calculating the encryptions to all possible keys of a given key range and comparing them to the encryptin of the secret key until a matching one is detected....
實現完整的近距離無線通訊體系 (2008.01.30)
近年來,相關產業的重要技術廠商已針對行動付費以及其它NFC新應用,共同發展出許多標準和解決方案。到目前為止,這些業者針對行動付費的發展重點在於手機內部功能和新出現的NFC標準
-Powered Keylogger 2.2 (2007.11.03)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 2.1 (2007.05.26)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 2.0 (2007.02.03)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Powered Keylogger 1.60 (2006.08.26)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
擴大小型記憶卡新興應用領域 (2006.07.06)
媒體公司與服務供應商正在尋找一種系統,不只能支援在儲存卡預錄付費內容,還能安全簡便地下載及租用內容。並讓客戶在各種不同裝置之間分享授權內容,但沒有有非法複製與分享檔案的風險
-Powered Keylogger 1.4 (2006.01.15)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Top Secret Crypto Gold 4.10.000 (2005.08.09)
Top Secret Crypto, a file and e-mail encryption program, maintains your communications privacy over the Internet. It incorporates RSA public key cryptography which uses the One Time Pad Encryption System as its conventional encryption algorithm
-Powered Keylogger 1.35 (2005.07.30)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
促進WLAN安全防護之簡易網路設定方法 (2005.07.05)
隨著市場出現了帶來安全且容易使用的通訊協定,使用者現在能享受目前業界最佳的安全防護。本文將探討WLAN的安全性,並介紹目前的網路威脅以及可用的通訊協定,然後再以一個市場上的解決方案為例,說明使用者也能輕鬆解決這些威脅
-Powered Keylogger 1.30 (2005.03.19)
Powered Keylogger allows you to invisibly monitor all activity on your computer, including Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, passwords, sent/received emails, desktop snapshots and more. The program comes with a built-in log viewer that allows you to review all logged information by category and date, with options to filter the logs based on several criteria
-Top Secret Crypto Gold 4.00.000 (2005.03.09)
Top Secret Crypto, a file and e-mail encryption program, maintains your communications privacy over the Internet. It incorporates RSA public key cryptography which uses the One Time Pad Encryption System as its conventional encryption algorithm
掌握消費特性 決勝DC市場 (2004.08.04)
Dan Vivoli認為,唯有深入分析並掌握市場上數位產品主流使用群之消費特性,才能研發更具競爭力的產品,並在生活數位化、數位生活化的DC市場趨勢裏事半功倍、日進千里
掌握消費特性 決勝DC市場 (2004.08.03)
Dan Vivoli認為,唯有深入分析並掌握市場上數位產品主流使用群之消費特性,才能研發更具競爭力的產品,並在生活數位化、數位生活化的DC市場趨勢裏事半功倍、日進千里


     [1]  2   [下一頁]

  十大熱門新聞
1 Basler全新小型高速線掃描相機適合主流應用
2 意法半導體整合化高壓功率級評估板 讓馬達驅動器更小且性能更強
3 Pilz開放式模組化工業電腦適用於自動化及傳動技術
4 SKF與DMG MORI合作開發SKF INSIGHT超精密軸承系統
5 宜鼎推出DDR5 6400記憶體 同級最大64GB容量及全新CKD元件
6 宜鼎E1.S固態硬碟因應邊緣伺服器應用 補足邊緣AI市場斷層
7 SCIVAX與Shin-Etsu Chemical聯合開發全球最小的3D感測光源裝置
8 Microchip支援NIDIA Holoscan感測器處理平台加速即時邊緣AI部署
9 瑞薩全新RA8 MCU系列將Arm Cortex-M85處理器高效引入成本敏感應用
10 Flex Power Modules為AI資料中心提供高功率密度 IBC 系列

AD

刊登廣告 新聞信箱 讀者信箱 著作權聲明 隱私權聲明 本站介紹

Copyright ©1999-2024 遠播資訊股份有限公司版權所有 Powered by O3
地址:台北市中山北路三段29號11樓 / 電話 (02)2585-5526 / E-Mail: webmaster@ctimes.com.tw