-
这是一个模拟键盘操作的程序,用C#实现,可以作为一个例程来学习...
这是一个模拟键盘操作的程序,用C#实现,可以作为一个例程来学习-This is a simulated keyboard operation procedures, using C# Realize, can be used as a routine to learn
- 2022-02-21 21:49:56下载
- 积分:1
-
VB发送Email
VB发送Email-sending email by vb
- 2023-01-03 07:45:04下载
- 积分:1
-
用于锁定计算机的程序,vb环境开发,可在windows9x/win2k/winXP等环境下运行。...
用于锁定计算机的程序,vb环境开发,可在windows9x/win2k/winXP等环境下运行。-computer lock for the procedure, vb environmental development, the environment, etc. windows9x/win2k/winXP run.
- 2022-03-17 01:18:39下载
- 积分:1
-
常见的光盘防拷贝保护技术
常见的光盘防拷贝保护技术-Common anti-CD-ROM copy protection technology
- 2022-07-02 12:44:35下载
- 积分:1
-
a good TCP and UDP ports controlled by example! Little changes, write a flood pr...
一个很好的TCP和UDP端口控制的例子!稍加改动,写一个flood程序没问题!附VB的演示程序-a good TCP and UDP ports controlled by example! Little changes, write a flood procedures No problem! A VB Demonstration Program
- 2022-02-01 17:27:01下载
- 积分:1
-
把网卡设为混杂模式的sniffer 的小例子, vc6.0 , win2000下运行通过, 不用设备驱动程序 只能接受ip包,无法接收与ip包同级的其它网络包,...
把网卡设为混杂模式的sniffer 的小例子, vc6.0 , win2000下运行通过, 不用设备驱动程序 只能接受ip包,无法接收与ip包同级的其它网络包,如arp等 listview显示-put mixed mode sniffers small examples, vc6.0, WIN2000 running through without device drivers can only receive ip packet, can not receive the same level with the ip packet other packet networks, such as arp error revealed
- 2022-05-23 09:24:33下载
- 积分:1
-
用置换的方法对文件进行加密,采用C语言实现,简单的一个例子,对于学习是很有帮助的。...
用置换的方法对文件进行加密,采用C语言实现,简单的一个例子,对于学习是很有帮助的。-replacement with the right documents encrypted using C language, a simple example, the study is very helpful.
- 2022-05-18 18:37:49下载
- 积分:1
-
用Visual C++编写的UDP客户端程序。
用Visual C++编写的UDP客户端程序。-Using Visual C++ Prepared UDP client program.
- 2022-11-10 21:35:04下载
- 积分:1
-
本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。本书首先概述了计算机和网络安全概念并解释了Java安全模型,并在此基础上,详细描述了Ja...
本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。本书首先概述了计算机和网络安全概念并解释了Java安全模型,并在此基础上,详细描述了Java 2平台中新增加的许多安全结构方面的措施,同时对Java安全性的实施提出了使用指导,描绘了如何定制、扩展和精化安全结构以及成功实现的技术细节。本书为建立安全、有效、强大和可移植的Java应用程序和applet提供了重要的信息,对于致力于研究Java平台的专业人员是一本必不可少的参考书。
-Clear and this book gives a comprehensive description of the Java platform security, Java security architecture explores the insider. The book begins with an overview of computer and network security concepts and explain the Java security model, and on this basis, a detailed description of the Java 2 platform in the new structure of a number of security measures, while the implementation of Java security proposed the use of guide, describing how to customize, expansion and refinement of the security structures, as well as the successful implementation of the technical details. The book for the establishment of safe, effective, powerful and portable Java applications and applet provides important information for the Java platform dedicated to the research profes
- 2022-02-24 21:17:59下载
- 积分:1
-
seru溢出
seru溢出-seru overflow
- 2022-01-24 10:18:57下载
- 积分:1