Learn about two Explorer Shell Extensions: One creates File Checksums; the other verifies File Checksums.
Articles Written by Jeffrey Walton
Learn about various Check Digit Schemes and how to implement the scheme.
Protect software with product keys based on Elliptic Curve Cryptography.
Learn how to create a Signing of Product Keys to validate activations.
Protect Software with Product Keys based on the Advanced Encryption Standard (AES).
Learn how to compile and integrate Crypto++ into the Microsoft Visual C++ environment.