一乐LIST 能够返回你的Topic值, 得到Message 的作者等功能
上传时间: 2014-11-28
上传用户:wanqunsheng
snmp4j 1.8.2版 The org.snmp4j classes are capable of creating, sending, and receiving SNMPv1/v2c/v3 messages. A SNMP message is composed of its message header and its PDU payload. This package contains three main groups of classes and interfaces:
标签: receiving creating classes capable
上传时间: 2016-12-31
上传用户:qazxsw
CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.
标签: CAN configuring and transmit
上传时间: 2013-12-11
上传用户:weiwolkt
struts validator验证框架 1、配置: * 加入国际化配置在struts-config.xml文件中,如: <message-resources parameter="MessageResources" /> * 提供国际化资源文件 * 引入validator插件在struts-config.xml文件中,如: <plug-in className="org.apache.struts.validator.ValidatorPlugIn"> <set-property property="pathnames" value="/WEB-INF/validator-rules.xml,/WEB-INF/validation.xml"/> </plug-in> * 提供validation.xml和validator_rules.xml文件,将此文件拷贝到WEB-INF下 2、validator服务器端验证 * 配置validation.xml文件 3、validator客户端验证(javascript) ) * 配置validation.xml文件 * 在jsp页面中包含< html:javascript> * 对需要验证的表单定义onsubmit事件,其中事件名称为validate+ActionForm的名称,如:validateLoginForm
标签: struts-config validator struts xml
上传时间: 2017-01-24
上传用户:silenthink
EJB3的入门资料,相当不错的一个东东.具体包括SessionBean, Message Driven Bean, EntityBean,是入门的首选
标签: EJB3
上传时间: 2013-12-17
上传用户:heart520beat
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789
以传统的C/SDK 撰写Windows 程序,最大的好处是可以清楚看见整个程序的来龙去脉 和消息动向,然而这些重要的动线在MFC 应用程序中却隐晦不明,因为它们被Application Framework 包起来了。这一章主要目的除了解释MFC 应用程序的长像,也要从MFC 源代 码中检验出一个Windows 程序原本该有的程序进入点(WinMain)、视窗类别注册 (RegisterClass)、窗口产生(CreateWindow)、消息循环(Message Loop)、窗口函数 (WindowProcedure)等等动作,抽丝剥茧彻底了解一个MFC 程序的诞生与结束,以及生 命过程。
上传时间: 2017-03-22
上传用户:athjac
Introduction Sometimes you may collide with the following problem: a third-party binary component or control embedded into your application displays windows (usually message boxes) that hang your code until they are closed. If you do not have the source code of this binary and one does not have a good API to change one’s bad behaviour programmatically, it can be a real headache using the one. A famous example of such a binary is the WebBrowser control in .NET.
标签: Introduction third-party Sometimes following
上传时间: 2013-12-31
上传用户:pinksun9
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx