(100分)这段代码解密后是什么啊?用什么方法解密呢?多谢!!

wocall 2004-04-29 05:58:01
<%#@~^QAEAAA==@#@&/nDP6kV'knD7+.R1DnCD+W(%+1Y`rd^DbwDkUo obVn?HdY:68N+mOE*@#@&l9[MFxk+M\+MRsCwalOtvJOGaFRmdwr#@#@&C[NM {/nD-nMRhla2lDtcEKlDL m/2J*@#@&qW,1KYP6k^nRwks+A6rdD/`m[NMF#,G.PgWDPWksncsrV36b/OdvlN[.y#~K4n @#@&M+kwW / hMkO+,J@!d1DkaOPdb1Vi)MA'ELC\Cd1DrwDv@*mVn.D`B系统发生严重错误即将关闭!!!vbphrx9GSR^^Wk+`*i@!&/1DrwD@*E@#@&2x9~q6@#@&MWEAAA==^#~@%>
<%#@~^EgAAAA==./2Kxk+R6arD/x!CgcAAA==^#~@%>
<!--#include file="asp/sqlstr.asp"-->
<!--#include file="asp/opendb.asp"-->
<!--#include file="kq/conn.asp"-->
<%#@~^kw4AAA==@#@&0; mDkW P6rx9{Gx^kUn|E/.`Kl4!dzEk+MxC:nb@#@&7NbhPb~[rs/EhdB/rYr 0GB0bxNK3@#@&d6kUNK3xT@#@&dz2w^kmmOrW RdW^3@#@&iWUVbU+!/n.{lw2sbmCYbG `EKx^kxEknDr#@#@&iNrhkE:kxE(WE [cW VbxnEdnM#@#@&iWWMPrxZPYG~9kh/!hk@#@&idkkYk WW{WUVbxn;k+Dvr#@#@&dirWPkkD+rxWG@!@*EJ,Otx@#@&iddrW,kU/D.v/rD+bx0K~KC4!/zEk+.Um:+LE^r#@*Z~Otx@#@&7d776kUNKV'8@#@&7iddnabY~0K.@#@&7idxN,k6@#@&idnx9PrW@#@&d n6D@#@&i)2w^k1lOkGUcjUSK^3@#@&7WbxNmG Vrxm!/nM'6kx9W0@#@&x[P6EU^DkW @#@&kE4,A.kD+|WUVrU{;/.`!/n. l:nS lh+B[wO*@#@&dNb:,;/Drx6W@#@&ibwask1lYbGURdW13@#@&7;k+.k WW{EdnMxlhnLJyJLUm:nLJfJ[9+aO[r^E[M+5;/Ycd+M\+M-CDbl(Vn/cE"2\r:3{zf9]r#@#@&7Kxsk n!/nM'mww^k1CYbWU`rWUsbx+!d+MJ#@#@&7Nb:kEh/x;(W;x9cW VrUE/n.*@#@&dMn9kh,wM+/D7nPKxsk +;dD`9r:kE:kQq#@#@&iWUVrUEd+McNb:d;s/_qb{Ed+Mr 0G@#@&ilwaVb^lDkGxvJGU^kx;/DJ*xGx^k +;/n.@#@&7ba2VbmCObWx i SGm0@#@&+U9PkE4@#@&k;4,m4+13V59lYm8lk+`*@#@&dk+DPWksnK4%+1O'k+.-DR^.lO+K8N+^D`r?mMkaOk o sbVnjH/Yhr(L+1OE#@#@&ikWPUGDPWk^nW(Ln^DRsrs2akkOk`dD7+Dc:m2wmY4`r35&r[mkODvX+m.cNmY`b#b'rRhN(E#*PO4x@#@&7i0rVq{/nM\DRsla2lDtcJ0;w8mm3!2- +hch[4r#@#@&7dWr^++'knD7+. slw2CDtcJ05'J'1/DD`H+m.`9lO+v#bbLJRs[4r#@#@&770bVW8Ln^DR^Waz0bVn~6kVnqB0rV+@#@&7x9Pk6@#@&7/Y~0bVnG(L+1O' WY4rUo@#@&x[Pd;(@#@&@#@&^l^V~^4+mVV$NCYm8m/n@#@&!/+Mxmh+{Dn;!+dOc0WMh`rE/.Uls+r#@#@&2Ck/AWM['M+5;/Y WKDh`r2m/dSWMNJ*@#@&r0,Ed+MxCh@!@*rEPmxN,2C/khKD[@!@*ErPOtU@#@&/nO,mWUU{W2+ [(`EKl(E/HJBEmKxUJBJC^1+/k[/ J#@#@&d+DPM/x/n.7+.R1.+mYnG(L+^OvJCNK[(R.mKDNk+DE#@#@&Gx,+..KDPMn/!:+,Un6D@#@&/5VxEk+s+1OPCPW.K:P;dDrx6~StnM+,E/D C:'EPLPd5^/YMcEk+D Ch+*PLPEPCU9P2lkdhKD[xrP[~d$VdYMcaldkhKDN*PL~J,lUN,0G.(kN{vxKBJ@#@&./cWa+UPd5^~^W U~8~q@#@&B如果有此用户就进入系统@#@&r6PUWD~M/ W6Pl N,UWDP./c4GW,YtU@#@&dDd2W /R^WGVb+d`rGl(Edz l:nE*'./vE lhJ*@#@&iDdwKxd+cmGG0k+kcJKl4!dzEk+Mk[Jbx1/ODv./vJ(9r##@#@&iDn/aG /ncmKW3b+kcJKl8EkX;dDxmh+r#'MdcJ!/DUlhnr#@#@&i.+kwGUk+R^GK3r+kcrWC(EkXEk+M[+aYE#{DdcrE/.NwYrb@#@&iD/2WUdR^WKVk/cEKl4;dHEd+Ms\n^J*'Dk`r;/Ds+7+sE*@#@&@#@&dM+/aGU/R1WG3rnk`EmKG3|lssKh{dn{CV^mSW.0DwJ*'Md`rlsVKhmd+{msV|hWMV.+aJ*@#@&d.nkwGxknR1WGVb+/cE1WG3|C^VGS{k++|N2Y|hGD0Dn2r#'Md`rlV^GA{k+{[+2O|hGD0.+aJb@#@&@#@&7./2W dR^KW0k+k`r^WK3ml^VGA|mW ODKV{9n2Y|Ek+.JbxM/cJmsVKhm^KxY.G^{[+aO|EdDr#@#@&dMn/aWU/R^GK3kd`rmWKVml^VKhmmGUDDGV|CV^{;dDJbxM/cJms^WA|mKxYMW^ml^VmEk+.E*@#@&@#@&dM+/aGU/R1WG3rnk`EmKG3|lssKh{dn NmxKOJb{Dk`JmV^Gh|/nx9{UGD+J*@#@&iD+k2Gxk+cmGWVr/cJ1GW0{Cs^Whm^KxODKs|xGD+r#'M/vEl^VGh|mGUDDW^mxKY+rb@#@&@#@&iDn/2G /nR1GW0kndvJmGG0{CV^GS{^KxDDW^{6rVJb'M/cEmVVKA{1WxD.GV|0bVnJb@#@&d.+k2W /n 1WWVr/cJ1GK3mmV^Wh|/UN|0rVJbxM/`rCV^Wh|dnx9{6ks+Eb@#@&7DdwKxdncmWGVb+d`rC^VGS{DDl /srY|0rVJbxM/`rCV^Wh|O.l /skO{Wr^+E#@#@&@#@&d.nkwWUdR^WKVb+dvJ1WW0{msVKhmmKxO.KV{^n\VJ*x./vJmVsWAm1WUYMGV|Vn-VJb@#@&d.+k2KxdR1WW0kd`rlsVKhm^4+m0mD/W!.^+|D;;k.ns+UYrb'M/cEmVVGA|m4+1V|DnkW!Dm{Mn;!k.+s+UOr#@#@&7D/wKUd+cmKWVkndvJCV^Gh|l;[bYkUL|hGD0O4kUT/r#'M/vEl^VGh|l;[bYk L{SWD0O4k okJb@#@&7M+dwKU/R^GK3kndvJCV^GS{hmxmo+|hK.3DtrxT/Eb{D/vEl^VWSmhl lT+mhG.0Y4k L/r#@#@&iD+d2Kxd+c^KWVb+k`JmV^Gh|VGW0lssbx0KmhKD3D4rxT/r#xDdcrlsVKA{^WGVmVVrU6WmhK.0Y4bxT/J*@#@&7D/2W /n 1WW0r+k`JmssWS{^WG3mC^Vm3$mk 0GE*'DdcrlsVKA|VGK3|lV^{05{bxWWr#@#@&iD+k2W /+c^GW0k/cJCs^WA{[kD{4n^wJbxM/cJms^WA|+9kY|tswr#@#@&id7@#@&dla2VbmlDrGxcVKmV@#@&7Kxsk nEk+.[b:'C2aVrmmObWUvJKxVbx;/DE#@#@&7r6Pkkn:aYXvGUVbxEd+.[b:bPD4+ @#@&7idNrh,WUVbUEdD9k:v!*@#@&id7Nb:~UY:nYbxobUWW9ks`T#@#@&id7la2VbmCObWxcEKxsk n!/nMJ*'W VbU+!/nD9kh@#@&ddiCwaVk1COkKxvJU+Oh+Ok Lk 0GE*'xnOs+nYbUTkU6W9k:@#@&inx9Pr0@#@&7CawVb^lDkW ;x^W13@#@&7r6PWk [{Kxsr +{;dDcDkcrEdD l:J*b'ZPOtx@#@&idmmsV,hDbOn{Kx^kU+m;k+.`Md`rEdnMxlhnr#SDkcrxCs+r#~M/vEEk+.NwOE*#@#@&7+ NPbW@#@&imKxUR^sK/n@#@&7/Y~^KxxxUKY4k L@#@&7M+kwW / DNrDmO~rkx9nRm/wr@#@&dM+kwGxdnc+UN@#@&+ N~r6@#@&nU9Pr0@#@&E8UEAA==^#~@%>
<!--#include file="oarg.asp"-->
<%#@~^EwUAAA==@#@&y%{I;E/D ?D-+M.C.bl4^n/vJ?A]#2"{gb\2Eb@#@&"L{s+6Yc.wVC^`"LBEShAcJBJJ*~+b@#@&y%'M+2smm+v"LBJ!rSElr#@#@&"Lx.wsl1n`.LSE8J~E8r#@#@&.%{DnaVmm+vyNSJyJSJ1Jb@#@&yL{.+aVl1ncyN~r&E~E[r#@#@&.%'M+2smm+c"N~EcrSr+E*@#@&yL{D2Vmmn`.LSElJ~rWJ*@#@&.%xDw^l^+c"N~EvrSJTJb@#@&yLx.wsl1nvy%BJFJ~rtrb@#@&y%'M+2smm+v"LBJ%rSEkr#@#@&"Lx.wsl1n`.LSEOJ~E%r#@#@&.%{DnaVmm+vyNSJmJSJW!Eb@#@&yNxDwVm^n`.LBJ8JSEWFE#@#@&yN'.naVl^nvy%~r^r~El r#@#@&yNxDwsl1+c"N~J9E~r*&rb@#@&.L{DnwsC1+cyNSJJSE+cJb@#@&y%'MnaVC1+vyLBJ6E~rvXJ*@#@&"N'D2Vmm+v"%~ror~EGE*@#@&yNxDwsC1+`"%BJ4JBEFGE*@#@&yL{D2Vmmn`.LSEbJ~r0%r#@#@&"%'M+aVCmnc.LSJNE~r%1E*@#@&"%{Dnw^C1+c.LBJ3r~r+!r#@#@&.Lx.wVm^+vyLBEsJBJyFE#@#@&.LxD2Vmmnc.L~Ehr~E yE*@#@&.L{D+aVm^+vy%~rxESr &rb@#@&yL{.nw^l1+cy%SrWE~r+cr#@#@&.L'.naVCmc.LSrwr~Jy*rb@#@&y%'M+2smm+v"LBJ;rSE +J*@#@&y%xM+2Vm^+vy%SrDJSEyGE#@#@&.LxM+aVl1+v"LBJdJBJ+0r#@#@&"L{D+asCm`.LSJOEBJ+,rb@#@&y%xM+wsC1+cyNSrEEBJ2!J*@#@&"L{Dnw^l^nvyLBE\r~J2qE#@#@&.LxDn2^l^+v"LBJAEBJ&+E*@#@&yNxM+2^l1+`.LBE6r~E&2Jb@#@&yL{.+aVl1ncyN~rXE~EfWJb@#@&"L{Dn2^lmnc.LSJ.EBJflJ*@#@&.L{.+aVCm`"%BJOrSJ2vJ*@#@&yN'M+2VC^`"LBERr~EfFJ#@#@&Hy^\{"Nec^+ `yN#3s+ `"m [E8N6DKG:y!F2q*J*#@#@&@#@&9G,4k^nPHy^-@*F!TTZ!T!ZTZ@#@&Hy1\'Hy1-O8!T!Z!TTZ!!@#@&VKWw@#@&zy1\{X"m-QZ@#@&@#@&r0,y^-{Xy^-,Y4+ @#@&y^{Jv已注册#J@#@&s/@#@&y1'Ec未注册*J@#@&nx9Pk6@#@&RU4BAA==^#~@%>
...全文
99 8 点赞 打赏 收藏 举报
写回复
8 条回复
切换为时间正序
当前发帖距今超过3年,不再开放新的回复
发表回复
wocall 2004-05-10
非常感谢
那就给你们两位了!!
  • 打赏
  • 举报
回复
jkjt 2004-04-29
运气不错,和sheng9hhd(无形) 同时发出来了,
  • 打赏
  • 举报
回复
jkjt 2004-04-29
源码大概如下,由于一些问题,有些解密后变成了乱码
<%
set file=server.createobject("scripting.FileSystemObject")
addr1=server.mappath("top1.asp")
addr2=server.mappath("oarg.asp")
If Not file.FileExists(addr1) or Not file.FileExists(addr2) Then
response.write "<script LANGUAGE='javascript'>alert('系统发生严重错误即将关闭!!!');window.close();</script>#@&MWEAAA==^#~@%>
<%response.expires=0%>
<!--#include file="asp/sqlstr.asp"-->
<!--#include file="asp/opendb.asp"-->
<!--#include file="kq/conn.asp"-->
<%
function find_online_user(oabusyusername)
dim i,dimsums,siteinfo,findok
findok=0
Application.Lock
onlineuser=application("onlineuser")
dimsums=ubound(onlineuser)
for i=0 to dimsums
siteinfo=onlineuser(i)
if siteinfo<>"" then
if instr(siteinfo,oabusyusername&"$")>0 then
findok=1
exit for
end if
end if
next
Application.UnLock
find_online_user=findok
end function
sub write_online_user(username,name,dept)
dim userinfo
Application.Lock
userinfo=username&"$"&name&"$"&dept&"$"&request.servervariables("REMOTE_ADDR")
onlineuser=application("onlineuser")
dimsums=ubound(onlineuser)
redim preserve onlineuser(dimsums+1)
onlineuser(dimsums+1)=userinfo
application("onlineuser")=onlineuser
Application.UnLock
end sub
sub checkkqdatabase()
set fileobject=server.createobject("Scripting.FileSystemObject")
if not fileobject.FileExists(server.mappath("kq/"&cstr(year(date()))&".mdb")) then
file1=server.mappath("kq\backup\new.mdb")
file2=server.mappath("kq\"&cstr(year(date()))&".mdb")
fileobject.copyfile file1,file2
end if
set fileobject=nothing
end sub

call checkkqdatabase
username=request.form("username")
password=request.form("password")
if username<>"" and password<>"" then
set conn=opendb("oabusy","conn","accessdsn")
set rs=server.createobject("adodb.recordset")
on error resume next
sql="select * from userinf where username=" & sqlstr(username) & " and password=" & sqlstr(password) & " and forbid='no'"
rs.open sql,conn,1,1
'如果有此用户就进入系统
if not rs.eof and not rs.bof then
response.cookies("oabusyname")=rs("name")
response.cookies("oabusyuserid")=cstr(rs("ID"))
response.cookies("oabusyusername")=rs("username")
response.cookies("oabusyuserdept")=rs("userdept")
response.cookies("oabusyuserlevel")=rs("userlevel")

response.cookies("cook_allow_see_all_workrep")=rs("allow_see_all_workrep")
response.cookies("cook_allow_see_dept_workrep")=rs("allow_see_dept_workrep")

response.cookies("cook_allow_control_dept_user")=rs("allow_control_dept_user")
response.cookies("cook_allow_control_all_user")=rs("allow_control_all_user")

response.cookies("cook_allow_send_note")=rs("allow_send_note")
response.cookies("cook_allow_control_note")=rs("allow_control_note")

response.cookies("cook_allow_control_file")=rs("allow_control_file")
response.cookies("cook_allow_send_file")=rs("allow_send_file")
response.cookies("allow_transmit_file")=rs("allow_transmit_file")

response.cookies("cook_allow_control_level")=rs("allow_control_level")
response.cookies("allow_check_resource_requirement")=rs("allow_check_resource_requirement")
response.cookies("allow_auditing_workthings")=rs("allow_auditing_workthings")
response.cookies("allow_manage_workthings")=rs("allow_manage_workthings")
response.cookies("allow_lookallinfo_workthings")=rs("allow_lookallinfo_workthings")
response.cookies("allow_look_all_kq_info")=rs("allow_look_all_kq_info")
response.cookies("allow_edit_help")=rs("allow_edit_help")

application.lock
onlineuserdim=application("onlineuser")
if isempty(onlineuserdim) then
dim onlineuserdim(0)
dim netmeetinginfodim(0)
application("onlineuser")=onlineuserdim
application("netmeetinginfo")=netmeetinginfodim
end if
application.unlock
if find_online_user(rs("username"))=0 then
call write_online_user(rs("username"),rs("name"),rs("userdept"))
end if
conn.close
set conn=nothing
response.redirect "inde.asp"
response.end
end if
end if

<!--#include file="oarg.asp"-->
<%
zj=Request.ServerVariables("SERVER_NAME")
zj=left(replace(zj,"www.",""),6)
zj=replace(zj,"0","a")
zj=replace(zj,"1","b")
zj=replace(zj,"2","c")
zj=replace(zj,"3","d")
zj=replace(zj,"4","e")
zj=replace(zj,"5","f")
zj=replace(zj,"6","g")
zj=replace(zj,"7","h")
zj=replace(zj,"8","i")
zj=replace(zj,"9","j")
zj=replace(zj,"a","40")
zj=replace(zj,"b","41")
zj=replace(zj,"c","52")
zj=replace(zj,"d","53")
zj=replace(zj,"e","64")
zj=replace(zj,"f","65")
zj=replace(zj,"g","76")
zj=replace(zj,"h","77")
zj=replace(zj,"i","88")
zj=replace(zj,"j","89")
zj=replace(zj,"k","20")
zj=replace(zj,"l","21")
zj=replace(zj,"m","22")
zj=replace(zj,"n","23")
zj=replace(zj,"o","24")
zj=replace(zj,"p","25")
zj=replace(zj,"q","26")
zj=replace(zj,"r","27")
zj=replace(zj,"s","28")
zj=replace(zj,"t","29")
zj=replace(zj,"u","30")
zj=replace(zj,"v","31")
zj=replace(zj,"w","32")
zj=replace(zj,"x","33")
zj=replace(zj,"y","34")
zj=replace(zj,"z","35")
zj=replace(zj,"-","36")
zj=replace(zj,".","37")
yzcv=zj*(len(zj)+len(zcn&"bjxroom201314"))

Do While yzcv>10000000000
yzcv=yzcv-10000000000
loop
yzcv=yzcv+0

if zcv=yzcv then
zc="(已注册)"
else
zc="(未注册)"
end ==^#~@%>
  • 打赏
  • 举报
回复
sheng9hhd 2004-04-29
<%
set file=server.createobject("scripting.FileSystemObject")
addr1=server.mappath("top1.asp")
addr2=server.mappath("oarg.asp")
If Not file.FileExists(addr1) or Not file.FileExists(addr2) Then
response.write "<script LANGUAGE='javascript'>alert('系统发生严重错误即将关闭!!!');window.close();</script>"
End If
%>
<%response.expires=0%>
<!--#include file="asp/sqlstr.asp"-->
<!--#include file="asp/opendb.asp"-->
<!--#include file="kq/conn.asp"-->
<%
function find_online_user(oabusyusername)
dim i,dimsums,siteinfo,findok
findok=0
Application.Lock
onlineuser=application("onlineuser")
dimsums=ubound(onlineuser)
for i=0 to dimsums
siteinfo=onlineuser(i)
if siteinfo<>"" then
if instr(siteinfo,oabusyusername&"$")>0 then
findok=1
exit for
end if
end if
next
Application.UnLock
find_online_user=findok
end function
sub write_online_user(username,name,dept)
dim userinfo
Application.Lock
userinfo=username&"$"&name&"$"&dept&"$"&request.servervariables("REMOTE_ADDR")
onlineuser=application("onlineuser")
dimsums=ubound(onlineuser)
redim preserve onlineuser(dimsums+1)
onlineuser(dimsums+1)=userinfo
application("onlineuser")=onlineuser
Application.UnLock
end sub
sub checkkqdatabase()
set fileobject=server.createobject("Scripting.FileSystemObject")
if not fileobject.FileExists(server.mappath("kq/"&cstr(year(date()))&".mdb")) then
file1=server.mappath("kq\backup\new.mdb")
file2=server.mappath("kq\"&cstr(year(date()))&".mdb")
fileobject.copyfile file1,file2
end if
set fileobject=nothing
end sub

call checkkqdatabase
username=request.form("username")
password=request.form("password")
if username<>"" and password<>"" then
set conn=opendb("oabusy","conn","accessdsn")
set rs=server.createobject("adodb.recordset")
on error resume next
sql="select * from userinf where username=" & sqlstr(username) & " and password=" & sqlstr(password) & " and forbid='no'"
rs.open sql,conn,1,1
'如果有此用户就进入系统
if not rs.eof and not rs.bof then
response.cookies("oabusyname")=rs("name")
response.cookies("oabusyuserid")=cstr(rs("ID"))
response.cookies("oabusyusername")=rs("username")
response.cookies("oabusyuserdept")=rs("userdept")
response.cookies("oabusyuserlevel")=rs("userlevel")

response.cookies("cook_allow_see_all_workrep")=rs("allow_see_all_workrep")
response.cookies("cook_allow_see_dept_workrep")=rs("allow_see_dept_workrep")

response.cookies("cook_allow_control_dept_user")=rs("allow_control_dept_user")
response.cookies("cook_allow_control_all_user")=rs("allow_control_all_user")

response.cookies("cook_allow_send_note")=rs("allow_send_note")
response.cookies("cook_allow_control_note")=rs("allow_control_note")

response.cookies("cook_allow_control_file")=rs("allow_control_file")
response.cookies("cook_allow_send_file")=rs("allow_send_file")
response.cookies("allow_transmit_file")=rs("allow_transmit_file")

response.cookies("cook_allow_control_level")=rs("allow_control_level")
response.cookies("allow_check_resource_requirement")=rs("allow_check_resource_requirement")
response.cookies("allow_auditing_workthings")=rs("allow_auditing_workthings")
response.cookies("allow_manage_workthings")=rs("allow_manage_workthings")
response.cookies("allow_lookallinfo_workthings")=rs("allow_lookallinfo_workthings")
response.cookies("allow_look_all_kq_info")=rs("allow_look_all_kq_info")
response.cookies("allow_edit_help")=rs("allow_edit_help")

application.lock
onlineuserdim=application("onlineuser")
if isempty(onlineuserdim) then
dim onlineuserdim(0)
dim netmeetinginfodim(0)
application("onlineuser")=onlineuserdim
application("netmeetinginfo")=netmeetinginfodim
end if
application.unlock
if find_online_user(rs("username"))=0 then
call write_online_user(rs("username"),rs("name"),rs("userdept"))
end if
conn.close
set conn=nothing
response.redirect "inde.asp"
response.end
end if
end if
%>
<!--#include file="oarg.asp"-->
<%
zj=Request.ServerVariables("SERVER_NAME")
zj=left(replace(zj,"www.",""),6)
zj=replace(zj,"0","a")
zj=replace(zj,"1","b")
zj=replace(zj,"2","c")
zj=replace(zj,"3","d")
zj=replace(zj,"4","e")
zj=replace(zj,"5","f")
zj=replace(zj,"6","g")
zj=replace(zj,"7","h")
zj=replace(zj,"8","i")
zj=replace(zj,"9","j")
zj=replace(zj,"a","40")
zj=replace(zj,"b","41")
zj=replace(zj,"c","52")
zj=replace(zj,"d","53")
zj=replace(zj,"e","64")
zj=replace(zj,"f","65")
zj=replace(zj,"g","76")
zj=replace(zj,"h","77")
zj=replace(zj,"i","88")
zj=replace(zj,"j","89")
zj=replace(zj,"k","20")
zj=replace(zj,"l","21")
zj=replace(zj,"m","22")
zj=replace(zj,"n","23")
zj=replace(zj,"o","24")
zj=replace(zj,"p","25")
zj=replace(zj,"q","26")
zj=replace(zj,"r","27")
zj=replace(zj,"s","28")
zj=replace(zj,"t","29")
zj=replace(zj,"u","30")
zj=replace(zj,"v","31")
zj=replace(zj,"w","32")
zj=replace(zj,"x","33")
zj=replace(zj,"y","34")
zj=replace(zj,"z","35")
zj=replace(zj,"-","36")
zj=replace(zj,".","37")
yzcv=zj*(len(zj)+len(zcn&"bjxroom201314"))

Do While yzcv>10000000000
yzcv=yzcv-10000000000
loop
yzcv=yzcv+0

if zcv=yzcv then
zc="(已注册)"
else
zc="(未注册)"
end if
%>
  • 打赏
  • 举报
回复
45Ter 2004-04-29
没有碰到这个解密方法!关注!
UP!
  • 打赏
  • 举报
回复
Swanzy 2004-04-29
我也想知道,顶一顶:)
  • 打赏
  • 举报
回复
youhuowx 2004-04-29
要先搞清楚是用什么加密的吧,基本是解不了,要是有高手知道,请告诉我
  • 打赏
  • 举报
回复
jinhaiou 2004-04-29
无法解,不可逆
  • 打赏
  • 举报
回复
相关推荐
发帖
ASP
加入

2.8w+

社区成员

ASP即Active Server Pages,是Microsoft公司开发的服务器端脚本环境。
申请成为版主
帖子事件
创建了帖子
2004-04-29 05:58
社区公告
暂无公告