精华内容
下载资源
问答
  • Boilsoft Video Splitter

    2011-04-25 13:01:07
    Boilsoft Video Splitter 是一个用来分割、剪切或修剪大的 AVI、MPEG、RM、ASF、WMV、3GP 或 MP4 视频文件为小的视频片断而不必重新编码的工具。视频分割软件内置视频播放器,您可以轻易按时间或选择范围来分割 AVI...
  • 一定要学会自己剪辑视频,但是影视剪辑工具很多,各个方面的专业性又不同,操作也各有不同,对于新手用户来说,真的不知道选择哪一款比较,所以小编准备向各位新手用户推荐boilsoft video splitter这款方便的影视...

    点击下载出处:boilsoft video splitter v7.02.2绿色破解版

    对影视制作有兴趣的朋友,一定要学会自己剪辑视频,但是影视剪辑工具很多,各个方面的专业性又不同,操作也各有不同,对于新手用户来说,真的不知道选择哪一款比较,所以小编准备向各位新手用户推荐boilsoft video splitter这款方便的影视剪辑软件,体积很小,便于携带,而且剪辑功能非常好用,也没有其他多余功能,非常适合影视专业的学生自己剪辑视频。这款软件在保证原有视频画质的基础上,还添加了不同格式文件的转码功能,比如AVI、MP4这些格式的视频文件,剪辑完成后,因为视频文件的格式不同无法完成使用合并功能,还要转换格式才能实现。但是boilsoft video splitter做到了这点,不同格式无缝连接,轻松完成视频制作,因此如果你想制作简单的剪辑视频,那么它会是你的最好选择!

    使用说明

    1.用户解压后即可正常使用,选择需要编辑的视频,选择剪辑部分即可完成剪辑

    软件特点

    1、直接流剪切,不必重新编码。
    2、Boilsoft Video Splitter破解版支持分割 AVI、Divx、MPEG-4 视频文件。
    3、支持分割 MPEG-1、MPEG-2、VOB 视频文件。
    4、支持分割 ASF、WMV、WMA 文件。
    5、支持分割 Real 媒体(.rm、.rmvb)。
    6、支持分割 MP4(.mp4、m4a)文件。
    7、支持分割 3GP(.3gp、3g2)文件。
    8、支持分割 VCD(.dat)文件。
    9、支持分割 AC3 文件。
    10、Boilsoft Video Splitter破解版支持分割 MPEG 音频文件,MP1、MP2、MP3。
    11、支持大视频文件,即使大于 2GB。
    12、非常快速并且没有质量损失。
    13、非常友好的用户界面。

    功能介绍

    1、直接流减少,没有编码
    将视频文件很快地源文件格式,不需要重新编码。MP4格式包括AVI、MPEG VOB,3 gp,RM,/ WMV / ASF的WMA,MKV MP3和FLV都支持。输出文件质量是相同的源视频/音频质量。分裂速度是非常高的。分裂10倍的速度比编码模式。
    2、分割视频从一种格式到另一种格式
    编码分裂模式支持分裂任何格式的视频格式和输出任何格式文件作为你喜欢。Boilsoft Video Splitter破解版支持几乎所有的视频格式。输出格式包括:3 gp、AVI、DVD,FLV,iPod,MP3,MP4,MPEG,PSP,RM,SVCD,VCD,VOB和WMV。
    3、只有自由分割视频或分成几个片段
    提取视频的任何部分通过设置开始和结束时间与内置的播放器,或将文件分成多个块大小相等。
    4、强大和易于使用
    把一个大的视频文件,甚至大于2gb。支持拖放。所有编码器/解码器是内置的。

    展开全文
  • boilsoftvideojoiner 合拼文件,Boilsoft Video Splitter分割文件
  • Easy Video Splitter 可以将大的 AVI、DivX或 MPEG(MPG) 影片档分割成较小的影片片段,提供了影片播放的功能,您可以依照您所看到的影片位置建立分割片段,也可以使用自动分割。Easy Video Splitter转换快速,而且...
  • <div><p>If I setup tunnel between video decoder and video splitter, and the video decoder generates video frames very fast, then I can't read all the frames from the output port of video splitter....
  • 好用的视频分割工具Allok Video Splitter
  • Calls to <code>scenedetect.video_splitter.split_video_mkvmerge</code> end with a <code>ERROR:root:Error splitting video (mkvmerge returned 2).</code></p> <p><strong>Required Information: Provide the ...
  • Boilsoft Video Splitter 5.21

    2010-06-12 02:16:51
    快速截取视频 如遇到“看起来你的解码没有安装正确” 请下载ffdshow
  • Ultra_Video_Splitter

    2018-08-02 14:05:25
    轻巧的视频剪辑软件,操作简便;是剪辑素材的利器之一
  • SolveigMM Video Splitter绿色中文版

    千次阅读 2020-06-16 16:35:21
    资源地址:SolveigMM Video Splitter绿色中文版 加盟过程 源文件和目标文件 源文件和目标文件是受支持格式的视频文件。源文件包含可以拆分为部分的视频,目标文件包含最终的影片剪辑。在拆分过程中,源文件保留在其...

    使用教程

    1、分裂过程
    拆分是将视频文件划分为多个部分的过程。例如,您可以使用不需要的场景(例如商业广告,损坏的视频)剪切出一段视频。拆分过程使源文件保持原样,将结果保存在目标文件中。资源地址:SolveigMM Video Splitter绿色中文版
    加盟过程
    源文件和目标文件
    源文件和目标文件是受支持格式的视频文件。源文件包含可以拆分为部分的视频,目标文件包含最终的影片剪辑。在拆分过程中,源文件保留在其原始位置,不会更改或删除。
    2、标记
    标记是片段的组成部分。 片段由两个标记组成:开始和结束。 它设置在当前光标位置。
    Video Splitter有两种类型的标记,即开始标记和结束标记。
    在下面,您将找到具有开始标记和结束标记视图的表格,处于选定状态和未选择状态。
    蓝色表示选择了标记。 如果未选择标记,则它具有白色。
    注意:放置结束标记后,所选片段将折叠。 因此,您将看到特殊的一行而不是两行Begin / End Marker描绘了折叠的片段。
    如果您点击这样折叠的sighn片段,它将被部署(有关详细信息,请参阅片段部分)。
    删除和定位等操作仅应用于选定的标记。
    3、片段
    片段是由两个标记限制的电影(或音频)文件的一部分,这两个标记将被移除或保存在最终电影中,例如,你需要削减的商业街区。
    Video Splitter有两种编辑模式:“剪切”和“保持”。
    默认情况下,使用“剪切”模式。这意味着用户选择的选择将被删除。
    切出的片段通常以灰色突出显示。
    您可以通过选择组合框列表中的同等菜单来更改编辑的“模式”以保存片段。
    您可以在下面的选定状态和未选择状态下查看样本保留和切出的片段。
    请记住,在对结束标记进行调整后,片段将被折叠,因此如果最近设置了两个标记,您将看到折叠片段的一个标记符号。
    这种折叠的片段将从转发的视频/音频文件中剪切掉。
    如果某些标记的时间位置更正,您可以通过双击部署折叠的片段。
    使用选中的片段在“剪切”和“保持”状态下具有相同打开文件的时间轴看起来像这样:
    “剪切”模式
    有关更详细的颜色定义,请参阅使用拆分控件部分。

    展开全文
  • BoilsoftVideoSplitter7.02.2安装与破解,强大的视频剪辑功能,支持多视频格式输出
  • Allok Video Splitter是一款强劲的视频文件分割工具,可将一个巨大的AVI,DivX,MPEG I/II,VOB,DAT,WMV,ASF文件切割或截断成小的片断。使用内置的播放器,你可以把一部电影分割成AVI/DivX ,MPEG I/II,WMV/ASF格式的小...
  • 支持多种格式的视频文件的无损分割,非常适合个人平时的剪辑,速度快,不用重新转码。
  • Ultra Video Splitter 6.4.0311和注册码

    热门讨论 2013-05-24 23:31:12
    Ultra Video Splitter 6.4.0311及...专业的视频文件分割工具,支持无编码分割、剪辑视频文件,Ultra Video Splitter 支持众多视频格式,包括 AVI、MP4、FLV、MOV、Divx、XviD、MPEG、WMV、ASF、RM、RMVB、3GP 等等。
  • 视频编辑器
  • Boilsoft Video Splitter 是分割速度最快的视频分割器,既可分割视频文件,也可分割音频文件。
  • 强大视频分割软件 - Boilsoft Video Splitter绿色便携版,解压后直接运行即可。
  • Boilsoft Video Splitter 是一个用来分割、剪切或修剪大的 AVI、MPEG、RM、ASF、WMV、3GP 或 MP4 视频文件为小的视频片断而不必重新编码的工具。视频分割软件内置视频播放器,您可以轻易按时间或选择范围来分割 AVI...
  • BoilsoftVideoSplitter无需编码而直接切割、剪辑视频文件.zip
  • Ultra Video Splitter v6.0.0801中文绿色破解版 免安装版
  • 标 题: 【原创】Absolute Video Splitter Joiner注册算法分析 作 者: lnn1123 时 间: 2006-08-19,12:09:58 链 接: http://bbs.pediy.com/showthread.php?t=30713 Absolute Video Splitter Joiner注册算法分析

    标 题: 【原创】Absolute Video Splitter Joiner注册算法分析
    作 者: lnn1123
    时 间: 2006-08-19,12:09:58
    链 接: http://bbs.pediy.com/showthread.php?t=30713

    Absolute Video Splitter Joiner注册算法分析

    by lnn1123
    最进颓废,找软柿子玩玩.
    用了RSA,base64

    ;//验证
    CODE:00506F84 sub_506F84      proc  near               ; DATA XREF: CODE:00506EE0o
    CODE:00506F84
    CODE:00506F84 var_8           = dword  ptr  -8
    CODE:00506F84 var_4           = dword  ptr  -4
    CODE:00506F84
    CODE:00506F84                 push     ebp
    CODE:00506F85                 mov      ebpesp
    CODE:00506F87                 push     0
    CODE:00506F89                 push     0
    CODE:00506F8B                 push     ebx
    CODE:00506F8C                 mov      ebxeax
    CODE:00506F8E                 xor      eaxeax
    CODE:00506F90                 push     ebp
    CODE:00506F91                 push     offset  loc_507031
    CODE:00506F96                 push     dword  ptr  fs :[eax ]
    CODE:00506F99                 mov      fs :[eax ], esp
    CODE:00506F9C                 lea      edx , [ebp +var_4]
    CODE:00506F9F                 mov      eax , [ebx +314h]
    CODE:00506FA5                 call     @TControl@GetText$qqrv ; TControl::GetText(void)
    CODE:00506FAA                 lea      edx , [ebp +var_8]
    CODE:00506FAD                 mov      eax , [ebx +318h]
    CODE:00506FB3                 call     @TControl@GetText$qqrv ; TControl::GetText(void)
    CODE:00506FB8                 mov      eaxds :off_51647C
    CODE:00506FBD                 mov      eax , [eax ]
    CODE:00506FBF                 mov      ecx , [ebp +var_8]
    CODE:00506FC2                 mov      edx , [ebp +var_4]
    CODE:00506FC5                 call     serial_Check
    CODE:00506FCA                 test     alal
    CODE:00506FCC                 jz       short loc_506FFE
    CODE:00506FCE                 mov      eaxds :off_51647C
    CODE:00506FD3                 mov      eax , [eax ]
    CODE:00506FD5                 mov      edx , [ebp +var_4]
    CODE:00506FD8                 call     sub_511F38
    CODE:00506FDD                 push     40h
    CODE:00506FDF                 mov      ecxoffset  dword_507040
    CODE:00506FE4                 mov      edxoffset  unk_507054
    CODE:00506FE9                 mov      eaxds :off_5166DC
    CODE:00506FEE                 mov      eax , [eax ]
    CODE:00506FF0                 call     @Forms@TApplication@MessageBox$qqrpxct1i ; Forms::TApplication::MessageBox(char *,char  *,int)
    CODE:00506FF5                 mov      eaxebx
    CODE:00506FF7                 call     @Forms@TCustomForm@Close$qqrv ; Forms::TCustomForm::Close(void)
    CODE:00506FFC                 jmp      short loc_507016
    CODE:00506FFE ; ----------------------------------------------------------------------------
    CODE:00506FFE
    CODE:00506FFE loc_506FFE:                             ; CODE XREF: sub_506F84+48j
    CODE:00506FFE                 push     40h
    CODE:00507000                 mov      ecxoffset  dword_507088
    CODE:00507005                 mov      edxoffset  unk_507090
    CODE:0050700A                 mov      eaxds :off_5166DC
    CODE:0050700F                 mov      eax , [eax ]
    CODE:00507011                 call     @Forms@TApplication@MessageBox$qqrpxct1i ; Forms::TApplication::MessageBox(char *,char  *,int)
    CODE:00507016
    CODE:00507016 loc_507016:                             ; CODE XREF: sub_506F84+78j
    CODE:00507016                 xor      eaxeax
    CODE:00507018                 pop      edx
    CODE:00507019                 pop      ecx
    CODE:0050701A                 pop      ecx
    CODE:0050701B                 mov      fs :[eax ], edx
    CODE:0050701E                 push     offset  loc_507038
    CODE:00507023
    CODE:00507023 loc_507023:                             ; CODE XREF: sub_506F84+B2j
    CODE:00507023                 lea      eax , [ebp +var_8]
    CODE:00507026                 mov      edx , 2
    CODE:0050702B                 call     @System@@LStrArrayClr$qqrv ; System::__linkproc__ LStrArrayClr(void)
    CODE:00507030                 retn
    CODE:00507031 ; ----------------------------------------------------------------------------
    CODE:00507031
    CODE:00507031 loc_507031:                             ; DATA XREF: sub_506F84+Do
    CODE:00507031                 jmp      @System@@HandleFinally$qqrv ; System::__linkproc__ HandleFinally(void)
    CODE:00507036 ; ----------------------------------------------------------------------------
    CODE:00507036                 jmp      short loc_507023
    CODE:00507038 ; ----------------------------------------------------------------------------
    CODE:00507038
    CODE:00507038 loc_507038:                             ; DATA XREF: sub_506F84+9Ao
    CODE:00507038                 pop      ebx
    CODE:00507039                 pop      ecx
    CODE:0050703A                 pop      ecx
    CODE:0050703B                 pop      ebp
    CODE:0050703C                 retn
    CODE:0050703C sub_506F84      endp  ; sp = -4

    ;///核心代码
    CODE:00511BB8 serial_Check    proc  near               ; CODE XREF: sub_506F84+41p
    CODE:00511BB8                                         ; sub_511D48+100p
    CODE:00511BB8
    CODE:00511BB8 var_1C          = dword  ptr  -1Ch
    CODE:00511BB8 var_14          = dword  ptr  -14h
    CODE:00511BB8 var_C           = dword  ptr  -0Ch
    CODE:00511BB8 var_8           = dword  ptr  -8
    CODE:00511BB8 var_4           = dword  ptr  -4
    CODE:00511BB8
    CODE:00511BB8                 push     ebp
    CODE:00511BB9                 mov      ebpesp
    CODE:00511BBB                 add      esp , 0FFFFFFE4h
    CODE:00511BBE                 push     ebx
    CODE:00511BBF                 xor      ebxebx
    CODE:00511BC1                 mov      [ebp +var_C], ebx
    CODE:00511BC4                 mov      [ebp +var_8], ecx
    CODE:00511BC7                 mov      [ebp +var_4], edx
    CODE:00511BCA                 mov      eax , [ebp +var_4]
    CODE:00511BCD                 call     @System@@LStrAddRef$qqrv ; System::__linkproc__ LStrAddRef(void)
    CODE:00511BD2                 mov      eax , [ebp +var_8]
    CODE:00511BD5                 call     @System@@LStrAddRef$qqrv ; System::__linkproc__ LStrAddRef(void)
    CODE:00511BDA                 lea      eax , [ebp +var_14]
    CODE:00511BDD                 mov      edx , off_503FCC
    CODE:00511BE3                 call     sub_40535C
    CODE:00511BE8                 lea      eax , [ebp +var_1C]
    CODE:00511BEB                 mov      edx , off_503FCC
    CODE:00511BF1                 call     sub_40535C
    CODE:00511BF6                 xor      eaxeax
    CODE:00511BF8                 push     ebp
    CODE:00511BF9                 push     offset  loc_511C7A
    CODE:00511BFE                 push     dword  ptr  fs :[eax ]
    CODE:00511C01                 mov      fs :[eax ], esp
    CODE:00511C04                 xor      ebxebx
    CODE:00511C06                 lea      edx , [ebp +var_14]
    CODE:00511C09                 mov      eaxds :off_516304 ; E=0x10001
    CODE:00511C0E                 call     RSA_init
    CODE:00511C13                 lea      edx , [ebp +var_1C]
    CODE:00511C16                 mov      eaxds :off_516308 ; N=24CB2A2F44E2626D8CC02B027
    CODE:00511C1B                 call     RSA_init
    CODE:00511C20                 lea      eax , [ebp +var_4]
    CODE:00511C23                 push     eax
    CODE:00511C24                 lea      ecx , [ebp +var_1C]
    CODE:00511C27                 lea      edx , [ebp +var_14]
    CODE:00511C2A                 mov      eax , [ebp +var_4]
    CODE:00511C2D                 call     @RSAEncrypt$qqr10AnsiStringr6TFGIntt2r10AnsiString ; RSAEncrypt(AnsiString,TFGInt  &,TFGInt &,AnsiString &)
    CODE:00511C32                 lea      edx , [ebp +var_C]
    CODE:00511C35                 mov      eax , [ebp +var_4]
    CODE:00511C38                 call     @ConvertBase256to64$qqrx10AnsiStringr10AnsiString ; ConvertBase256to64 (AnsiString,AnsiString &)
    CODE:00511C3D                 mov      eax , [ebp +var_8]
    CODE:00511C40                 mov      edx , [ebp +var_C]
    CODE:00511C43                 call     @System@@LStrCmp$qqrv ; System::__linkproc__ LStrCmp(void)
    CODE:00511C48                 jnz      short loc_511C4C
    CODE:00511C4A                 mov      bl , 1
    CODE:00511C4C
    CODE:00511C4C loc_511C4C:                             ; CODE XREF: serial_Check+90j
    CODE:00511C4C                 xor      eaxeax
    CODE:00511C4E                 pop      edx
    CODE:00511C4F                 pop      ecx
    CODE:00511C50                 pop      ecx
    CODE:00511C51                 mov      fs :[eax ], edx
    CODE:00511C54                 push     offset  loc_511C81
    CODE:00511C59
    CODE:00511C59 loc_511C59:                             ; CODE XREF: serial_Check+C7j
    CODE:00511C59                 lea      eax , [ebp +var_1C]
    CODE:00511C5C                 mov      edx , off_503FCC
    CODE:00511C62                 mov      ecx , 2
    CODE:00511C67                 call     sub_405460
    CODE:00511C6C                 lea      eax , [ebp +var_C]
    CODE:00511C6F                 mov      edx , 3
    CODE:00511C74                 call     @System@@LStrArrayClr$qqrv ; System::__linkproc__ LStrArrayClr(void)
    CODE:00511C79                 retn
    CODE:00511C7A ; ----------------------------------------------------------------------------
    CODE:00511C7A
    CODE:00511C7A loc_511C7A:                             ; DATA XREF: serial_Check+41o
    CODE:00511C7A                 jmp      @System@@HandleFinally$qqrv ; System::__linkproc__ HandleFinally(void)
    CODE:00511C7F ; ----------------------------------------------------------------------------
    CODE:00511C7F                 jmp      short loc_511C59
    CODE:00511C81 ; ----------------------------------------------------------------------------
    CODE:00511C81
    CODE:00511C81 loc_511C81:                             ; DATA XREF: serial_Check+9Co
    CODE:00511C81                 mov      eaxebx
    CODE:00511C83                 pop      ebx
    CODE:00511C84                 mov      espebp
    CODE:00511C86                 pop      ebp
    CODE:00511C87                 retn
    CODE:00511C87 serial_Check    endp

    ;///RSA_Encrypto

    CODE:00506A48 ; __fastcall RSAEncrypt(AnsiString, TFGInt &, TFGInt &, AnsiString &)
    CODE:00506A48 @RSAEncrypt$qqr10AnsiStringr6TFGIntt2r10AnsiString proc  near
    CODE:00506A48                                         ; CODE XREF: serial_Check+75p
    CODE:00506A48                                         ; sub_511C88+6Ap
    CODE:00506A48
    CODE:00506A48 var_30          = dword  ptr  -30h
    CODE:00506A48 var_2C          = dword  ptr  -2Ch
    CODE:00506A48 var_28          = dword  ptr  -28h
    CODE:00506A48 var_24          = dword  ptr  -24h
    CODE:00506A48 var_20          = dword  ptr  -20h
    CODE:00506A48 var_18          = dword  ptr  -18h
    CODE:00506A48 var_10          = dword  ptr  -10h
    CODE:00506A48 var_8           = dword  ptr  -8
    CODE:00506A48 var_4           = dword  ptr  -4
    CODE:00506A48 arg_0           = dword  ptr   8
    CODE:00506A48
    CODE:00506A48                 push     ebp
    CODE:00506A49                 mov      ebpesp
    CODE:00506A4B                 add      esp , 0FFFFFFD0h
    CODE:00506A4E                 push     ebx
    CODE:00506A4F                 push     esi
    CODE:00506A50                 push     edi
    CODE:00506A51                 xor      ebxebx
    CODE:00506A53                 mov      [ebp +var_30], ebx
    CODE:00506A56                 mov      [ebp +var_24], ebx
    CODE:00506A59                 mov      [ebp +var_28], ebx
    CODE:00506A5C                 mov      [ebp +var_2C], ebx
    CODE:00506A5F                 mov      ediecx
    CODE:00506A61                 mov      [ebp +var_8], edx
    CODE:00506A64                 mov      [ebp +var_4], eax
    CODE:00506A67                 mov      eax , [ebp +var_4]
    CODE:00506A6A                 call     @System@@LStrAddRef$qqrv ; System::__linkproc__ LStrAddRef(void)
    CODE:00506A6F                 lea      eax , [ebp +var_10]
    CODE:00506A72                 mov      edx , off_503FCC
    CODE:00506A78                 call     sub_40535C
    CODE:00506A7D                 lea      eax , [ebp +var_18]
    CODE:00506A80                 mov      edx , off_503FCC
    CODE:00506A86                 call     sub_40535C
    CODE:00506A8B                 lea      eax , [ebp +var_20]
    CODE:00506A8E                 mov      edx , off_503FCC
    CODE:00506A94                 call     sub_40535C
    CODE:00506A99                 xor      eaxeax
    CODE:00506A9B                 push     ebp
    CODE:00506A9C                 push     offset  loc_506C8F
    CODE:00506AA1                 push     dword  ptr  fs :[eax ]
    CODE:00506AA4                 mov      fs :[eax ], esp
    CODE:00506AA7                 lea      edx , [ebp +var_20]
    CODE:00506AAA                 mov      eaxoffset  _str_0_17.Text
    CODE:00506AAF                 call     sub_5055F0
    CODE:00506AB4                 lea      edx , [ebp +var_24]
    CODE:00506AB7                 mov      eaxedi
    CODE:00506AB9                 call     sub_50550C
    CODE:00506ABE                 mov      eax , [ebp +var_24]
    CODE:00506AC1                 call     @System@_16823  ; System::_16823
    CODE:00506AC6                 mov      ebxeax
    CODE:00506AC8                 lea      edx , [ebp +var_24]
    CODE:00506ACB                 mov      eax , [ebp +var_4]
    CODE:00506ACE                 call     unknown_libname_660 ; FGint Signatures
    CODE:00506AD3                 lea      eax , [ebp +var_24]
    CODE:00506AD6                 mov      ecx , [ebp +var_24]
    CODE:00506AD9                 mov      edxoffset  _str_111.Text ; 111是二进制,十进制是7,这里就是在注册名前加一个常数7计算RSA
    CODE:00506ADE                 call     @System@@LStrCat3$qqrv ; System::__linkproc__ LStrCat3(void)
    CODE:00506AE3                 mov      esiebx
    CODE:00506AE5                 dec      esi
    CODE:00506AE6                 jmp      short loc_506AF8
    CODE:00506AE8 ; ----------------------------------------------------------------------------
    CODE:00506AE8
    CODE:00506AE8 loc_506AE8:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+BDj
    CODE:00506AE8                 lea      eax , [ebp +var_24]
    CODE:00506AEB                 mov      ecx , [ebp +var_24]
    CODE:00506AEE                 mov      edxoffset  _str_0_17.Text
    CODE:00506AF3                 call     @System@@LStrCat3$qqrv ; System::__linkproc__ LStrCat3(void)
    CODE:00506AF8
    CODE:00506AF8 loc_506AF8:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+9Ej
    CODE:00506AF8                 mov      eax , [ebp +var_24]
    CODE:00506AFB                 call     @System@_16823  ; System::_16823
    CODE:00506B00                 cdq
    CODE:00506B01                 idiv     esi
    CODE:00506B03                 test     edxedx
    CODE:00506B05                 jnz      short loc_506AE8
    CODE:00506B07                 mov      eax , [ebp +var_24]
    CODE:00506B0A                 call     @System@_16823  ; System::_16823
    CODE:00506B0F                 mov      edxebx
    CODE:00506B11                 dec      edx
    CODE:00506B12                 mov      ecxedx
    CODE:00506B14                 cdq
    CODE:00506B15                 idiv     ecx
    CODE:00506B17                 mov      esieax
    CODE:00506B19                 lea      eax , [ebp +var_28]
    CODE:00506B1C                 call     @System@@LStrClr$qqrr17System@AnsiString ; System::__linkproc__ LStrClr (System::AnsiString &)
    CODE:00506B21                 test     esiesi
    CODE:00506B23                 jle      loc_506C33
    CODE:00506B29
    CODE:00506B29 loc_506B29:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+1D1 j
    CODE:00506B29                 lea      eax , [ebp +var_2C]
    CODE:00506B2C                 push     eax
    CODE:00506B2D                 mov      ecxebx
    CODE:00506B2F                 dec      ecx
    CODE:00506B30                 mov      edx , 1
    CODE:00506B35                 mov      eax , [ebp +var_24]
    CODE:00506B38                 call     @System@@LStrCopy$qqrv ; System::__linkproc__ LStrCopy(void)
    CODE:00506B3D                 jmp      short loc_506B51
    CODE:00506B3F ; ----------------------------------------------------------------------------
    CODE:00506B3F
    CODE:00506B3F loc_506B3F:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+137 j
    CODE:00506B3F                 lea      eax , [ebp +var_2C]
    CODE:00506B42                 mov      ecx , 1
    CODE:00506B47                 mov      edx , 1
    CODE:00506B4C                 call     sub_404E0C
    CODE:00506B51
    CODE:00506B51 loc_506B51:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+F5j
    CODE:00506B51                 lea      eax , [ebp +var_30]
    CODE:00506B54                 push     eax
    CODE:00506B55                 mov      ecx , 1
    CODE:00506B5A                 mov      edx , 1
    CODE:00506B5F                 mov      eax , [ebp +var_2C]
    CODE:00506B62                 call     @System@@LStrCopy$qqrv ; System::__linkproc__ LStrCopy(void)
    CODE:00506B67                 mov      eax , [ebp +var_30]
    CODE:00506B6A                 mov      edxoffset  _str_0_17.Text
    CODE:00506B6F                 call     @System@@LStrCmp$qqrv ; System::__linkproc__ LStrCmp(void)
    CODE:00506B74                 jnz      short loc_506B81
    CODE:00506B76                 mov      eax , [ebp +var_2C]
    CODE:00506B79                 call     @System@_16823  ; System::_16823
    CODE:00506B7E                 dec      eax
    CODE:00506B7F                 jg       short loc_506B3F
    CODE:00506B81
    CODE:00506B81 loc_506B81:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+12C j
    CODE:00506B81                 lea      edx , [ebp +var_10]
    CODE:00506B84                 mov      eax , [ebp +var_2C]
    CODE:00506B87                 call     sub_5055F0
    CODE:00506B8C                 mov      ecxebx
    CODE:00506B8E                 dec      ecx
    CODE:00506B8F                 lea      eax , [ebp +var_24]
    CODE:00506B92                 mov      edx , 1
    CODE:00506B97                 call     sub_404E0C
    CODE:00506B9C                 mov      eax , [ebp +var_2C]
    CODE:00506B9F                 mov      edxoffset  _str_0_17.Text
    CODE:00506BA4                 call     @System@@LStrCmp$qqrv ; System::__linkproc__ LStrCmp(void)
    CODE:00506BA9                 jnz      short loc_506BB8
    CODE:00506BAB                 lea      edx , [ebp +var_18]
    CODE:00506BAE                 lea      eax , [ebp +var_20]
    CODE:00506BB1                 call     sub_504F24
    CODE:00506BB6                 jmp      short loc_506BC9
    CODE:00506BB8 ; ----------------------------------------------------------------------------
    CODE:00506BB8
    CODE:00506BB8 loc_506BB8:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+161 j
    CODE:00506BB8                 lea      eax , [ebp +var_18]
    CODE:00506BBB                 push     eax
    CODE:00506BBC                 mov      ecxedi
    CODE:00506BBE                 mov      edx , [ebp +var_8]
    CODE:00506BC1                 lea      eax , [ebp +var_10]
    CODE:00506BC4                 call     sub_506398
    CODE:00506BC9
    CODE:00506BC9 loc_506BC9:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+16E j
    CODE:00506BC9                 lea      eax , [ebp +var_10]
    CODE:00506BCC                 call     @FGIntDestroy$qqrr6TFGInt ; FGIntDestroy(TFGInt &)
    CODE:00506BD1                 lea      eax , [ebp +var_2C]
    CODE:00506BD4                 call     @System@@LStrClr$qqrr17System@AnsiString ; System::__linkproc__ LStrClr (System::AnsiString &)
    CODE:00506BD9                 lea      edx , [ebp +var_2C]
    CODE:00506BDC                 lea      eax , [ebp +var_18]
    CODE:00506BDF                 call     sub_50550C
    CODE:00506BE4                 jmp      short loc_506BF6
    CODE:00506BE6 ; ----------------------------------------------------------------------------
    CODE:00506BE6
    CODE:00506BE6 loc_506BE6:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+1BB j
    CODE:00506BE6                 lea      eax , [ebp +var_2C]
    CODE:00506BE9                 mov      ecx , [ebp +var_2C]
    CODE:00506BEC                 mov      edxoffset  _str_0_17.Text
    CODE:00506BF1                 call     @System@@LStrCat3$qqrv ; System::__linkproc__ LStrCat3(void)
    CODE:00506BF6
    CODE:00506BF6 loc_506BF6:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+19C j
    CODE:00506BF6                 mov      eax , [ebp +var_2C]
    CODE:00506BF9                 call     @System@_16823  ; System::_16823
    CODE:00506BFE                 cdq
    CODE:00506BFF                 idiv     ebx
    CODE:00506C01                 test     edxedx
    CODE:00506C03                 jnz      short loc_506BE6
    CODE:00506C05                 lea      eax , [ebp +var_28]
    CODE:00506C08                 mov      edx , [ebp +var_2C]
    CODE:00506C0B                 call     @System@@LStrCat$qqrv ; System::__linkproc__ LStrCat(void)
    CODE:00506C10                 lea      eax , [ebp +var_18]
    CODE:00506C13                 call     @FGIntDestroy$qqrr6TFGInt ; FGIntDestroy(TFGInt &)
    CODE:00506C18                 dec      esi
    CODE:00506C19                 jnz      loc_506B29
    CODE:00506C1F                 jmp      short loc_506C33
    CODE:00506C21 ; ----------------------------------------------------------------------------
    CODE:00506C21
    CODE:00506C21 loc_506C21:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+1FC j
    CODE:00506C21                 lea      eax , [ebp +var_28]
    CODE:00506C24                 mov      ecx , 1
    CODE:00506C29                 mov      edx , 1
    CODE:00506C2E                 call     sub_404E0C
    CODE:00506C33
    CODE:00506C33 loc_506C33:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+DBj
    CODE:00506C33                                         ; RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+1D7j
    CODE:00506C33                 mov      eax , [ebp +var_28]
    CODE:00506C36                 cmp      byte  ptr  [eax ], 30h
    CODE:00506C39                 jnz      short loc_506C46
    CODE:00506C3B                 mov      eax , [ebp +var_28]
    CODE:00506C3E                 call     @System@_16823  ; System::_16823
    CODE:00506C43                 dec      eax
    CODE:00506C44                 jg       short loc_506C21
    CODE:00506C46
    CODE:00506C46 loc_506C46:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+1F1 j
    CODE:00506C46                 mov      edx , [ebp +arg_0]
    CODE:00506C49                 mov      eax , [ebp +var_28]
    CODE:00506C4C                 call     @ConvertBase2to256$qqr10AnsiStringr10AnsiString ; ConvertBase2to256 (AnsiString,AnsiString &)
    CODE:00506C51                 lea      eax , [ebp +var_20]
    CODE:00506C54                 call     @FGIntDestroy$qqrr6TFGInt ; FGIntDestroy(TFGInt &)
    CODE:00506C59                 xor      eaxeax
    CODE:00506C5B                 pop      edx
    CODE:00506C5C                 pop      ecx
    CODE:00506C5D                 pop      ecx
    CODE:00506C5E                 mov      fs :[eax ], edx
    CODE:00506C61                 push     offset  loc_506C96
    CODE:00506C66
    CODE:00506C66 loc_506C66:                             ; CODE XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+24C j
    CODE:00506C66                 lea      eax , [ebp +var_30]
    CODE:00506C69                 mov      edx , 4
    CODE:00506C6E                 call     @System@@LStrArrayClr$qqrv ; System::__linkproc__ LStrArrayClr(void)
    CODE:00506C73                 lea      eax , [ebp +var_20]
    CODE:00506C76                 mov      edx , off_503FCC
    CODE:00506C7C                 mov      ecx , 3
    CODE:00506C81                 call     sub_405460
    CODE:00506C86                 lea      eax , [ebp +var_4]
    CODE:00506C89                 call     @System@@LStrClr$qqrr17System@AnsiString ; System::__linkproc__ LStrClr (System::AnsiString &)
    CODE:00506C8E                 retn
    CODE:00506C8F ; ----------------------------------------------------------------------------
    CODE:00506C8F
    CODE:00506C8F loc_506C8F:                             ; DATA XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+54o
    CODE:00506C8F                 jmp      @System@@HandleFinally$qqrv ; System::__linkproc__ HandleFinally(void)
    CODE:00506C94 ; ----------------------------------------------------------------------------
    CODE:00506C94                 jmp      short loc_506C66
    CODE:00506C96 ; ----------------------------------------------------------------------------
    CODE:00506C96
    CODE:00506C96 loc_506C96:                             ; DATA XREF: RSAEncrypt(AnsiString,TFGInt &,TFGInt &,AnsiString &)+219 o
    CODE:00506C96                 pop      edi
    CODE:00506C97                 pop      esi
    CODE:00506C98                 pop      ebx
    CODE:00506C99                 mov      espebp
    CODE:00506C9B                 pop      ebp
    CODE:00506C9C                 retn     4
    CODE:00506C9C @RSAEncrypt$qqr10AnsiStringr6TFGIntt2r10AnsiString endp

    用的是FGint库,不过我不熟悉这个库,刚开始带入E,N计算RSA,结果就是不对,后来跟踪发现在注册名前加了一个常数7后计算的
    ,还有后面这个什么@ConvertBase256to64$qqrx10AnsiStringr10AnsiString函数,也应该是库里的,用这个 函数加密后的数据和
    base64不一样,里面的表也变了,变成这样了"aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ0123456789+=" , 不会d
    elphi,不是直接调用就可以keygen了,没办法还得用asm写.文章没什么新东西,主要是熟悉了一个FGint这个库.


    keygen asm
                   
    invoke  _BigPowMod,big_serial,big_e,big_n,big_serial             
    invoke  _BigOut,big_serial,16,addr  szserial                       
    invoke  strtohex,addr  szserial,offset  string2                     
    invoke  bbb,offset  string2,offset  outBuffer                    
    invoke  BaseEncode,offset  outBuffer,offset  serial

    下面是我写的这个@ConvertBase256to64$qqrx10AnsiStringr10AnsiString函数的汇编代码,代码可能比较垃 圾,发现如果函数里
    局部变量比较大时编译就有问题,所以就用的是全局变量
    bbb proc  source1:dword , destination:dword
    pushad
    invoke  lstrlen ,source1
    mov  esi ,source1
    lea  edi ,Bufferbits
    lea  ebx ,btbuffer
    mov  ecx ,eax
    @loop:
    mov  bitslen,0
    xor  eax ,eax
    lodsb
    push  ecx
    @@:
    mov  ecx ,2
    xor  edx ,edx
    div  ecx
    push  eax
    mov  eax ,edx
    .if  eax ==1
      mov  eax ,031h
    .else
      mov  eax ,030h
    .endif     
    stosb
    inc  bitslen
    pop  eax
    test  eax ,eax
    jnz  @B
    mov  ecx ,8
    mov  eax ,offset  bitslen
    movzx  eax ,byte  ptr  [eax ]
    sub  ecx ,eax
    .if  ecx
    @@:
        mov  eax ,30h
        stosb
        dec  ecx
        jnz  @B
    .endif  
    mov  eax ,edi
    dec  eax
    xor  edx ,edx
    aa:
    mov  cl ,byte  ptr  [eax ]
    mov  [ebx ],cl
    dec  eax
    inc  ebx
    inc  edx
    cmp  edx ,8
    jnz  aa

    pop  ecx
    dec  ecx
    jnz  @loop
    invoke  lstrcpy ,destination,addr  btbuffer
    invoke  RtlZeroMemory ,offset  Bufferbits,1024
    popad
    ret
    bbb endp

    ;//string to hex

    strtohex proc  inbf:DWORD , outbf:DWORD
    pushad
    lea  edi ,RSAbuffer
    invoke  lstrlen ,inbf
    mov  ecx ,eax
    mov  ebx ,2
    xor  edx ,edx
    div  ebx
    .if  edx
      mov  eax ,030h
      stosb
      mov  esi ,inbf
    @loc:  
      lodsb
      stosb
      dec  ecx
      jnz  @loc
      lea  esi ,RSAbuffer
      invoke  lstrlen ,offset  RSAbuffer
      mov  ecx ,eax
    .else
      mov  esi ,inbf
      
    .endif   
      mov  edi ,outbf
      
    @@:
                         lodsb
                         .if  eax  >= 061h
                            sub  eax ,057h
                         .elseif  eax  >= 041h
                            sub  eax ,037h
                         .elseif  eax  >=030h
                            sub  eax ,030h
                         .endif
                         shl  eax ,4
                         push  eax
                         lodsb
                         dec  ecx                      
                         mov  edx ,eax
                         .if  edx  >= 061h
                           sub  edx ,057h
                         .elseif  edx  >= 041h
                           sub  edx ,037h
                         .elseif  edx  >=030h
                           sub  edx ,030h
                         .endif
                         pop  eax
                         add  eax ,edx
                         and  eax ,0ffh
                         stosb
                         dec  ecx                 
                         jnz  @B


    popad
    ret
    strtohex endp
    ;//base256 final

    BaseEncode  proc   proc   uses  ebx  edi  esi  source:DWORD , destination:DWORD
          ;pushad
          mov  esi ,source
          mov  sig,1
    @@:      
      invoke  lstrlen , source
          push  eax
          mov  ecx ,6
          xor  edx ,edx
          div  ecx
          .if  edx
             pop  eax
             .if  sig==1
                add  esi ,eax
                mov  byte  ptr  [esi ],030h
             .else
                add  esi ,1
                mov  byte  ptr  [esi ],030h
             .endif       
          .endif
           mov  sig,0   
           test  edx ,edx
           jnz  @B
           
           invoke  lstrlen ,source
           push  eax
           mov  ecx ,6
           xor  edx ,edx
           div  ecx
           mov  edx ,eax
           pop  eax
           mov  ecx ,eax
           mov  esi ,source
           lea  edi ,tt
    @hhh:    
           lodsb
           sub  eax ,030h
           stosb
           dec  ecx
           jnz  @hhh
           lea  esi ,tt
           mov  edi ,destination
           mov  ecx ,edx
           xor  edx ,edx
    @@:
           lodsb
           shl  eax ,5
           add  edx ,eax
           lodsb
           shl  eax ,4
           add  edx ,eax
           lodsb
           shl  eax ,3
           add  edx ,eax
           lodsb
           shl  eax ,2
           add  edx ,eax
           lodsb
           shl  eax ,1
           add  edx ,eax
           lodsb
           shl  eax ,0
           add  edx ,eax
           movzx  eax ,byte  ptr  [base64_alphabet+edx ]
           xor  edx ,edx
           stosb     
           dec  ecx
           jnz  @B
    ;popad
    ret
    BaseEncode  endp

    展开全文
  • 视频合并软件Ultra Video Splitter V6.0 + 注册信息
  • 视频分割软件Ultra Video Splitter V6.0 + 注册信息
  • SolveigMM Video Splitter是一款出色的功能强大的无损视频编辑器,适用于处理MPEG-2,AVI,WMV,ASF,MP3,WMA文件。 编辑器无损且快速,只需点击几下鼠标即可无缝删除不需要的视频部分 - 完美地剪切和连接视频和...

    SolveigMM Video Splitter是一款出色的功能强大的无损视频编辑器,适用于处理MPEG-2,AVI,WMV,ASF,MP3,WMA文件。 编辑器无损且快速,只需点击几下鼠标即可无缝删除不需要的视频部分 - 完美地剪切和连接视频和音频流。 吸引人且直观的用户友好界面非常易于使用。 基于SolveigMM视频编辑SDK,我们的音频 - 视频编辑器提供令人难以置信的质量和速度,无需使用任何编码/解码过程。 在5.2版本中,我们引入了MPEG-2帧精确编辑。 SolveigMM先进技术可保留99%的数据,并且仅在视频片段的开头和结尾处对几帧进行转码,因此现在MPEG2文件也可以快速无损地处理。使用能够帮助用户轻松快速的进行合并、剪切等操作,支持批处理模式编辑功能,支持一次执行多个编辑任务,支持AVC/H264, MP4, MOV, AVCHD, MPEG-2, MPEG-1, MKV, AVI, WMV, MP3, WMA 等众多压缩格式文件,速度快、稳定、高.
    SolveigMM
    软件功能特色
    1、基于SolveigMMVideo Editing Engine视频编辑引擎设计;
    2、支持AVCHD格式文件 – (.m2ts);
    3、支持MPEG-2格式文件 – (.mpg, .mpeg, .vob, .ts );
    4、支持MP4格式文件 – (.mp4);
    5、支持MOV格式文件 – (.mov);
    6、支持MKV格式文件 – (.mkv);
    7、支持WebM格式文件 – (.webm);
    8、支持FLV格式文件 – (.flv);
    9、支持AVI格式文件 – (.avi );
    10、支持Windows影音格式文件- (.asf, .wma, .wmv, .wm);
    11、支持MPEG音频格式文件 – ( .mp1, .mp2, .mp3, .mpa);
    12、支持带有内嵌字幕的AVI, MKV, WEBM格式文件的编辑 (新特性):UTF8、ASS、SSA、GAB2;
    13、支持带有外挂字幕的AVI, MKV, WEBM, MP4格式文件的编辑 (新特性):ASS、SRT;
    14、支持带有多音轨的MKV, AVI, MP4, WEBM格式文件的编辑. (新特性);
    15、支持以”GOP精准度”模式编辑FLV格式文件;
    16、支持以”帧间精准度”模式编辑MPEG-2 / MPEG-1, ASF, AVI, WMV, MP4, MOV, MKV, AVCHD, FLV格式文件;
    17、支持所见即所得预览模式及高级的”GOP精准度”定位操作;
    18、可切除广告内容,支持一次切除一部影片中的多处区段,所以您通过几步简单操作就能去除影片中的所有广告内容。
    19、支持批处理模式编辑功能,众多数量的编辑任务可被一次执行。只支持版本Bisiness;
    20、支持影音文件合并功能;
    21、文件切片由零件,持续时间或文件大小。

    展开全文
  • 视频电影剪辑分割器,可将电影视频剪掉,分割.取其精华
  • SolveigMM Video Splitter 是一款出色的视频编辑软件,它支持AVC/H264, MP4, MOV, AVCHD, MPEG-2, MPEG-1, MKV, AVI, WMV, MP3, WMA 等众多压缩格式文件。此程序的操作是无损且快速的,通过点击几下鼠标就能准确无误...
  • Ultra Video Splitter 是一款视频分割工具。Ultra Video Splitter最近又更新了,版本号升级到了6.0.0801,相信广大的视频爱好者肯定对它不会陌生,可以说这个工具拾起来相当顺手,几乎包揽了很多视频格式的分割,最...
  • SolveigMM Video Splitter 视频无损剪辑合并工具 补丁 32位 SolveigMM Video Splitter 是一款出色的视频编辑软件,它支持AVC/H264, MP4, MOV, AVCHD, MPEG-2, MPEG-1, MKV, AVI, WMV, MP3, WMA 等众多压缩格式文件...
  • 【视频无损截取软件】SolveigMM Video Splitter Business Edition v7.x 破解版
  • SolveigMM Video Splitter 4.5是一款专业的视频剪切与合并工具,支持主流视频文件类型,使用它可轻松从视频中去除不想要的部分,只保留想保存的片断,也可以将多段单独的视频文件合并为一个完整的视频。...

空空如也

空空如也

1 2 3 4 5 ... 11
收藏数 211
精华内容 84
关键字:

splittervideo