很丰富的 Registry 改动例子,很多特别的例子 如: Change The Internet explorer Title, Showing the Windows Version on the Desktop Remove the shortcut arrows from all your icons Creating 3D Window Effect To prevent any changes to the Start Menu Disable Registry Editing Tools
标签: Registry
上传时间: 2017-02-11
上传用户:爺的气质
自己写的robocup-2d程序,从UVA改编 This method is the first complete simple team and defines the actions taken by all the players on the field (excluding the goalie). It is based on the high-level actions taken by the simple team FC Portugal that it released in 2000.
上传时间: 2014-01-27
上传用户:上善若水
Custom Visual Basic Packager and Installer for Visual Basic Developers. This is a group of standard exe projects 1. Packager 2. Setup1 The packager works like Visual basic Application deployment Wizard. And the setup1 project is used for the installation of the package. This project demonstrates how to compile visual basic project without launching the Vb6 kit and retrieving the dependency Files of any Visual basic project (although roughly done without any specific algorithm), Somebody can help me with this. I don’ t have time for the project, so I don’ t want any comment on the code indentation or arrangement and variable scoping. Comments are in the code therefore it would not be a problem to understand the code. If anyone wants to vote, I will like it Oh! I found some of the setup1 code and modify it with new features, so i have no or less credit for the setup1 project I felt like sharing code with PSCites. Thats why I made it
标签: Visual Basic Developers Installer
上传时间: 2017-02-26
上传用户:FreeSky
WiiFuse is a FUSE filesystem module for Linux and Mac OS X. It will let you mount a Wii disc ISO and browse its contents, and it contains a server which may be run on the Wii so you can browse the contents of the Wii s internal filesystem.
标签: X. filesystem WiiFuse module
上传时间: 2013-12-18
上传用户:rocketrevenge
ShCti driver user s manual, y Details NDIS driver development, Under XP-driven development (Engl Based on the expansion of passthr Parallel and Distributed Simulati The driver of a scanner to prepar Tuopu TCB8000 Chinese liquid crys USB development with Delphi sourc This is a printer port control-dr
标签: development driver XP-driven Details
上传时间: 2014-01-09
上传用户:黄华强
Measuring Frequency Content in Signals I this section we will study some non parametric methods for spectrum estimation of a stochastic process. These methods are described in the literature. All methods are based on the Periodogram which is defined for a sequence x[n] with length N according to
标签: parametric Measuring Frequency Content
上传时间: 2017-03-20
上传用户:秦莞尔w
Code was successfully implemented within ALtera FPGA with Quartus 6.0. It presents two polish own female names: ULA and ALA whose are scrolling on the 4-columns crystal LED. When you press the switch it will turn from ULA into ALA and continue scrolling.
标签: successfully implemented presents Quartus
上传时间: 2013-12-09
上传用户:zjf3110
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
Symbolic Representations of Time Series... SAX is just as good as other representations, or working on the raw data for most problems (Slides shown at the end of this presentation)
标签: Representations representations Symbolic working
上传时间: 2014-01-16
上传用户:dongqiangqiang
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔