虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

ALSO

  • PrintNow is a 32-bit application that runs only under Windows 95 or Windows NT 4.0. It allows your

    PrintNow is a 32-bit application that runs only under Windows 95 or Windows NT 4.0. It allows your PrtScr and Alt+PrtScr keys to print a screen capture directly to your printer instead of just copying the image to the Windows clipboard. PrintNow can ALSO print any DIB image in the clipboard, regardless of its original source. PrintNow supports multiple instances, it can print multiple copies of a screen capture to the same printer with different print settings, to several different printers, or any combination thereof, with a single keystroke.

    标签: Windows application PrintNow allows

    上传时间: 2015-04-27

    上传用户:zhanditian

  • Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wir

    Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It ALSO includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files. Kismet是一个针对IEEE802.11b无线局域网的嗅探和包分析器,支持大多数无线网卡,支持自动检测UDP、ARP和DHCP的数据包,支持通过CDP协议检测思科网络设备,支持加密数据包记录,采用与Ethereal和Tcpdump兼容的的数据包记录文件,支持通过用户提供地图来检测和评估无线网络范围。

    标签: network dissector sniffing capable

    上传时间: 2014-11-26

    上传用户:wweqas

  • Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a

    Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a public network resource unless some type of encryption is being used, secure socket layer is one example. Most FTP sites ALSO use plaintext passwords.

    标签: demonstrates plaintext passwords usernames

    上传时间: 2013-12-04

    上传用户:aeiouetla

  • WSP is an HTTP to WSP proxy that can be used to forward HTTP requests to WSP, which is used in WAP 1

    WSP is an HTTP to WSP proxy that can be used to forward HTTP requests to WSP, which is used in WAP 1.x. It may be called a reverse WAP gateway, and enables you to test or browse WAP sites with HTTP tools. It ALSO can be used with penetration test tools.

    标签: WSP HTTP used to

    上传时间: 2013-12-16

    上传用户:大三三

  • The project KEIL_IODemo shows how to use memory allocation routines (malloc) and char I/O (printf, s

    The project KEIL_IODemo shows how to use memory allocation routines (malloc) and char I/O (printf, scanf) via a serial interface with the Keil ARM toolchain. The I/O functions are adapted for the Analog Devices ADuC7000 series using the SERIAL.C module. The example ALSO shows the efficiency of the Keil CA ARM Compiler run-time library which is tuned for single chip systems.

    标签: KEIL_IODemo allocation routines project

    上传时间: 2013-12-08

    上传用户:ve3344

  • UART I/O and Memory Allocation Example for GNU The project GNU_IODemo shows how to use memory alloc

    UART I/O and Memory Allocation Example for GNU The project GNU_IODemo shows how to use memory allocation routines (malloc) and char I/O (printf, scanf) via a serial interface with the GNU toolchain. The I/O functions are adapted for the Analog Devices ADuC7000 series using the SERIAL.C module. The example ALSO shows the efficiency of the Keil CA ARM Compiler run-time library which is tuned for single chip systems.

    标签: Allocation GNU_IODemo Example project

    上传时间: 2015-05-04

    上传用户:Amygdala

  • This book focuses primarily on XML itself. It covers the fundamental rules that all XML documents an

    This book focuses primarily on XML itself. It covers the fundamental rules that all XML documents and authors must adhere to, whether a web designer uses SMIL to add animations to web pages or a C++ programmer uses SOAP to exchange serialized objects with a remote database. This book ALSO covers generic supporting technologies that have been layered on top of XML and are used across a wide range of XML applications.

    标签: fundamental XML documents primarily

    上传时间: 2014-01-14

    上传用户:zjf3110

  • JBoss, one of the leading java Open Source groups, integrates and develops these services for a full

    JBoss, one of the leading java Open Source groups, integrates and develops these services for a full J2EE-based implementation. JBoss provides JBossServer, the basic EJB container, and Java Manage Preface 18 Great Events of the Twentieth Centuryment Extension (JMX) infrastructure. It ALSO provides JBossMQ, for JMS messaging, JBossTX, for JTA/JTS transactions, JBossCMP for CMP persistence, JBossSX for JAAS based security, and JBossCX for JCA connectivity. Support for web components, such as servlets and JSP pages, is providedby an abstract integration layer. Implementations of the integration service are provided for third party servlet engines like Tomcat and Jetty. JBoss enables you to mix and match these components through JMX by replacing any component you want with a JMX compliant implementation for the same APIs.

    标签: integrates develops services leading

    上传时间: 2014-11-03

    上传用户:wsf950131

  • This a full 3-tier dababase application which includes a activex dll project(business objects) and a

    This a full 3-tier dababase application which includes a activex dll project(business objects) and a standard exe(UI). Besides all the database techniques it demonstrates, it ALSO shows how to make MSHFlexgrid a editable grid(with combobox, checkbox, datetimepicker) and how to merge a toolbar for multi forms.

    标签: application dababase business includes

    上传时间: 2014-01-01

    上传用户:qq21508895

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs ALSO include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    标签: ptfsf following the contains

    上传时间: 2013-11-28

    上传用户:风之骄子