登录
首页 » DOS » filejioner

filejioner

于 2011-10-18 发布 文件大小:2KB
0 96
下载积分: 1 下载次数: 3

代码说明:

  将现有多个文件修改后缀名,并合并为一个txt文件(More than one file to modify the existing extension, and combined into a txt file)

文件列表:

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • vc71453453624
    Shell监视程序,用于监视键盘和鼠标的输入输出,并有效地记录下来。(Shell monitoring program to monitor keyboard and mouse for input and output, and effectively recorded.)
    2010-05-09 16:15:29下载
    积分:1
  • csdpmi5s
    实现了dpmi1.0的除TSR外的所有功能,同时支持DPMI0.9的所有功能(In addition to the TSR achieved dpmi1.0 outside all functions, while supporting all the features of DPMI0.9)
    2010-03-02 10:02:41下载
    积分:1
  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • VBI-shell63
    采用ansys编程的车桥耦合程序,自主原创~单元采用的是shell63(Using the axle coupling ansys programming program, the original self ~ unit is shell63)
    2013-04-01 10:00:18下载
    积分:1
  • delaunay
    这是一个关于三角网格的程序的一部分,需要在vc++中应用(This is a triangular mesh on the part of the procedure, the need for vc++ Application)
    2016-02-16 16:58:35下载
    积分:1
  • psubst_v2_2
    使用微软操作系统内建指令”SUBST”的范例工具程序.在档案总管中加载虚拟磁盘驱动器,将您常用的目录变成磁盘驱动器代码,在我的计算机中方便快速的开启.(Built using Microsoft operating system command SUBST an example of tools procedures. In the Windows Explorer to load a virtual disk drive, commonly used in the directory of your disk drive into a code, on my computer quickly and easily open.)
    2008-12-18 14:50:50下载
    积分:1
  • Hacking-the-whole-solution-process
    讲述黑客基础知识。 1.网络以及相关知识 2.入侵概念和基础知识 3.入侵基本过程和使用工具(Basic knowledge about the hacking. 1 Network and Knowledge 2 invasion concepts and basics 3. Invasion process and the use of basic tools)
    2014-01-11 16:01:27下载
    积分:1
  • windowsrouter
    windwos系统路由表的操作和配置说明(Windows operating system routing table and configuration)
    2009-03-26 12:15:06下载
    积分:1
  • filejioner
    将现有多个文件修改后缀名,并合并为一个txt文件(More than one file to modify the existing extension, and combined into a txt file)
    2011-10-18 21:45:30下载
    积分:1
  • MsnPowerTalkTest
    硬件的相关操作的一些信息,希望对大家有所帮助(Hardware to operate some of the relevant information, and they hope to help everyone)
    2009-03-25 23:22:58下载
    积分:1
  • 696524资源总数
  • 103872会员总数
  • 62今日下载