-
DesktopSecuritySet1
自己做的ActiveX系统配置控件,单击按钮打开桌面安全设置1对话框,实现:
从活动桌面上删除Web内容;
强制从睡眠或挂起状态恢复时输入密码;
允许使用活动桌面;
禁止调整桌面工具栏长度;
禁止交互用户通过Windows窃听其它用户会话;
允许使用“桌面清理向导”;
禁止使用活动桌面的所有设置项目;
启用“开始”菜单常用程序组;
禁止控制面板和打印机文件夹;
禁止使用任务栏快捷方式菜单;
禁止使用“开始”菜单的“关闭系统”命令;
禁止使用“开始”菜单的“我的文档”命令;
禁止在桌面上运行任何程序;
隐藏桌面上的网上邻居以及所有图标;
隐藏“网络快捷方式”菜单、任务栏;
可以部署在服务器上,适合在公共电脑等不方便带文件的场合进行快速系统配置,也适合嵌入到其它程序中,进行快速开发。
(Make its own system configuration of ActiveX controls, click the Security Settings button to open the Desktop dialog box 1, to achieve:
Events delete from the desktop Web content
Mandatory from the state of sleep or hang password recovery
Permit the use of Active Desktop
Deskbar prohibited adjust length
Interactive users to prohibit other users through the Windows bugging conversations
Permit the use of the "Desktop Cleanup Wizard"
Prohibition of the Use of Active Desktop items all the settings
Opening of the "Start" menu common program group
Prohibition of the control panel and printers folder
Prohibit the use of the taskbar shortcut menu
Prohibit the use of "Start" menu s "closed system" command
Prohibit the use of "Start" menu s "My Documents" command
Prohibit the operation of any program on your desktop
Hide My Network Places on the desktop and all icons
Hide "Network Shortcuts" menu, task bar
Can be deployed on the server for computer)
- 2009-02-12 11:57:48下载
- 积分:1
-
weiwenwu
MFC实现文件传输,望有志者增加多线程的功能(MFC to achieve file transfer, and hopes to increase multi-threading features people with lofty ideals)
- 2009-10-23 16:18:19下载
- 积分:1
-
pipe
某石油公司计划建造一条由东向西的主输油管道。该管道要穿过一个有n 口油井的油田。从每口油井都要有一条输油管道沿最短路经(或南或北)与主管道相连。如果给定n 口油井的位置,即它们的x 坐标(东西向)和y 坐标(南北向),应如何确定主管道的最优位置, 即使各油井到主管道之间的输油管道长度总和最小的位置?证明可在线性时间内确定主管道的最优位置。(An oil company plans to construct a east to west from the main pipeline. The pipeline to pass through an oil field n wells. Wells from each must have a pipeline along the shortest path (or South or North) connected with the competent Road. If given the location of oil wells in n, that is, their x coordinates (east-west) and y coordinates (north-south), should be how to determine the optimal position in charge of Road, even if the wells to the pipeline in charge of Road between the sum of the smallest length location? proved to be linear time to determine the optimal position in charge of Road.)
- 2008-07-07 10:25:25下载
- 积分:1
-
lglr
拉格朗日插值拉格朗日插值拉格朗日插值拉格朗日插值(Lagrange interpolation Lagrange interpolation Lagrange interpolation)
- 2006-06-20 01:35:29下载
- 积分:1
-
communicatebook
通讯录 程序设计 大二作品 c++ 面向对象 文件读写 操作符重载(Address Book program design sophomore c++ object-oriented works of the file to read and write operator overloading)
- 2009-11-14 11:17:54下载
- 积分:1
-
CannycPP
c 实现 canny算子(c realize canny )
- 2016-04-11 15:44:07下载
- 积分:1
-
Ellipse-detection
能够检测椭圆,并且在已知摄像机安装高度和倾角的情况下实现单目测距,代码能够运行(Ellipse can be detected, and the camera installation height and in the case of the known inclination to achieve monocular ranging code to run)
- 2016-04-05 10:03:57下载
- 积分:1
-
16x16
16X16显示,比8X8显示大一点,可显示任何汉字,8X8显示不行。16的就完全可以。(16X16 display han zi.)
- 2012-02-27 15:30:55下载
- 积分:1
-
bianry
一种信息隐藏算法,二进制掩码,matlab下运行。直观,隐蔽性好(a code of information Hide,using bianry you can operate it in matlab.)
- 2011-12-20 00:54:59下载
- 积分:1
-
Embedded-in-the-DCT-coefficients-
在图像的DCT系数上嵌入信息,图像为常见的512*512大小的灰度图(实验所用图像为LENA.BMP)。嵌入的信息为一二进制Logo图(实验所用logo图为tj-logo.bmp),该图大小为32*32,共1024个Bit。
1. 在LENA图中嵌入水印,输出嵌入后的水印图像。
2. 对水印图像解码,输出解码后得到的logo图,并统计错误率。
3. 使用不同的嵌入强度进行嵌入,观察其对作品直觉效果和解码效果的影响,绘制相应的曲线。
4. 使用加入噪声、改变对比度、JPEG压缩等攻击方法对水印作品进行攻击,查看解码的效果。
(Information embedded in the DCT coefficients of the image, the image of the common 512* 512 size gray-scale (experimental image LENA.BMP). Information embedded in a binary Logo Figure (used in the experiment logo picture shows the tj-logo.bmp), the plot size 32* 32, 1024 Bit.
LENA Figure embedded watermark, the watermark image output embedded.
(2) logo watermark image decoding, the output decoded Figure statistical error rate.
(3) using a different embedding strength for embedding, observe the works intuitive effects and decoding results, and draw the corresponding curve.
(4) by adding the noise, change the contrast, JPEG compression attack methods to attack, to see the effect of decoding the watermark works.)
- 2012-04-16 18:56:11下载
- 积分:1