登录
首页 » QT » Desktop.tar

Desktop.tar

于 2009-09-21 发布 文件大小:915KB
0 186
下载积分: 1 下载次数: 38

代码说明:

  简单的聊天程序 包括客户端和服务器端,可以实现局域网中间的聊天功能(A simple chat program, including client and server side can be achieved among local area network chat)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ssh与websocket集成完成对websocket接口数据处理及存储
    ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储 ssh与websocket集成完成对websocket接口数据处理及存储
    2022-03-20 07:08:42下载
    积分:1
  • wpcapsrc_3_2_alpha1
    说明:  winpcap3.2的源代码,可以供研究网络捕获程序之用(winpcap3.2 the source code, can capture network for research procedures used)
    2006-03-27 09:12:04下载
    积分:1
  • top-down-computer-networks-
    一本关于自顶向下计算机网络的教科书的答案,很有作用(A top-down computer networks on the textbook answer, great for )
    2011-11-14 11:08:43下载
    积分:1
  • 75642532
    winsock完成端口,易语言写的网络相关程序,很好的参考。(The Winsock completion port, easy to network related written procedures, a good reference.)
    2013-10-01 14:10:32下载
    积分:1
  • 《Python+Cookbook》第三版中文v2.0.0
    说明:  用于学习python与cookbook的一本书,适用于python小伙伴(A book for learning Python and cookbook, for Python buddies)
    2020-06-20 12:20:02下载
    积分:1
  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • szdstx
    VC written program startup window style, debugging in VC through
    2018-10-21 12:54:27下载
    积分:1
  • 好东西
    good thing
    2022-03-10 04:20:12下载
    积分:1
  • 自己用libnids写的sniff,并把捕获分析的结果插入到mysql数据库中。与mysql的连接,以及操作是通过C语言实现的。希望大家共同进步。...
    自己用libnids写的sniff,并把捕获分析的结果插入到mysql数据库中。与mysql的连接,以及操作是通过C语言实现的。希望大家共同进步。-Their use libnids written sniff, and to capture the results of the analysis into the mysql database. With the mysql connection, as well as the operation is achieved through the C language. Hope that we make progress together.
    2023-05-19 00:40:02下载
    积分:1
  • 我封装的okhttp
    这是一款我封装的okhttp3,自动管理cookies,get,post,json请求和自动解析json功能,内附案例(This is a okhttp3 encapsulated by me, which automatically manages cookies, get, post, JSON requests and automatic parsing JSON functions.)
    2018-04-21 20:25:17下载
    积分:1
  • 696518资源总数
  • 106208会员总数
  • 21今日下载