虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

PASSwords

  • 业务管理:包括客房预订、入住登记、续住、换房、转账、其他服务提供、留言板、意见簿、走客结账、欠费结算。 ¯ 查询统计:包括历史单据、预订表、在住客人表、换房查询、转账查询、日经营状况、月收入状

    业务管理:包括客房预订、入住登记、续住、换房、转账、其他服务提供、留言板、意见簿、走客结账、欠费结算。 ¯ 查询统计:包括历史单据、预订表、在住客人表、换房查询、转账查询、日经营状况、月收入状况、客房利用率、实时房态。-system design focus of this chapter describe the development of small PowerBuilder 9.0 Rooms Management System process, through the study of this chapter, readers should be familiar with PowerBuilder 9.0 TreeView control and the right mouse button menu of use, master GroupBox, SingleLineEdit, CommandButton, RadioButton, PictureButton controls such as the similarities and differences to further understanding of data objects window displays various occasions the application. System to complete the task Macr system maintenance include : corporate information, the operator management, change PASSwords, management succession, dictionary management. Macr basic information : Rooms management system for the basic information management (including new, modify or delete), which is the basic informat

    标签: macr 查询 服务 留言板

    上传时间: 2013-12-20

    上传用户:ouyangtongze

  • simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiri

    simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and PASSwords through the ATM network to transmit to the server, ATM database server based on the information to confirm the account number and password is correct, the results back to the ATM terminal. If the correct account number and password, the ATM into the next terminal interface Otherwise prompt mistakes. Cancellation notice for the operation of the server ATM transactions concluded inquiries, deposits, withdrawals and alter the code operations are first sent an order to ATM servers, ATM by the database server implementation of the corresponding operation and operating res

    标签: write-offs Automatic functions including

    上传时间: 2014-01-20

    上传用户:semi1981

  • Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite

    Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to PASSwords and expiry dates. Send emails using Microsoft Email client. No need to cater for SMTP nor Exchange mail accounts. If you can send email with your outlook, you can send email with your application. Get some windows info with the sysinfoctrls member.

    标签: generated sensitive yourself encrypt

    上传时间: 2017-04-04

    上传用户:yuanyuan123

  • 在网络安全中经常会遇到rootkit

    在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures PASSwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    标签: rootkit 网络安全

    上传时间: 2017-04-04

    上传用户:xaijhqx

  • samba服务器实验指导

    第一节、samba是干什么的?它有什么用? Samba(SMB是其缩写) 是一个网络服务器,它是Linux作为本地服务器最重要的一个服务,用于Linux和Windows共享文件之用;Samba可以用于Windows和 Linux之间的共享文件,也一样用于Linux和Linux之间的共享文件;不过对于Linux和Linux之间共享文件有更好的网络文件系统 NFS,NFS也是需要架设服务器的; 2、安装及服务操作命令 安装samba程序非常简单,使用rpm -q samba查看当前系统是否已经安装了samba软件。 如果没有那就进入光盘,rpm -ivh *samba*.rpm即可。 仔细说下安装的包: samba-common-3.0.28-0.el5.8    //samba服务器和客户端中的最基本文件 samba-3.0.28-0.el5.8           //samba服务器核心软件包 system-config-samba-1.2.39-1.el5     //samba图形配置界面 samba-client-3.0.28-0.el5.8          //samba客户端软件   启动、暂停和停止服务: /etc/init.d/smb start /etc/init.d/smb stop /etc/init.d/smb restart 或 service smb start service smb stop service smb restart   第二节、由最简单的一个例子说起,匿名用户可读可写的实现 第一步: 更改smb.conf 我们来实现一个最简单的功能,让所有用户可以读写一个Samba 服务器共享的一个文件夹;我们要改动一下smb.conf ;首先您要备份一下smb.conf文件; [root@localhost ~]# cd /etc/samba [root@localhost samba]# cp smb.conf smb.conf.bak [root@localhost samba]# vi smb.conf 或geidt smb.conf & 然后我们把下面这段写入smb.conf中:   [global] workgroup = WORKGROUP netbios name = Liukai server string = Liukai's Samba Server security = share [test]         path = /opt/test         writeable = yes         browseable = yes         guest ok = yes 注解: [global]这段是全局配置,是必段写的。其中有如下的几行; workgroup 就是Windows中显示的工作组;在这里我设置的是WORKGROUP (用大写); netbios name 就是在Windows中显示出来的计算机名; server string 就是Samba服务器说明,可以自己来定义;这个不是什么重要的; security 这是验证和登录方式,这里我们用了share ;验证方式有好多种,这是其中一种;另外一种常用的是user的验证方式;如果用share呢,就是不用设置用户和密码了; [test] 这个在Windows中显示出来是共享的目录; path = 可以设置要共享的目录放在哪里; writeable 是否可写,这里我设置为可写; browseable 是否可以浏览,可以;可以浏览意味着,我们在工作组下能看到共享文件夹。如果您不想显示出来,那就设置为 browseable=no,guest ok 匿名用户以guest身份是登录; 第二步:建立相应目录并授权 [root@localhost ~]# mkdir -p /opt/test [root@localhost ~]# id nobody uid=99(nobody) gid=99(nobody) groups=99(nobody) [root@localhost ~]# chown -R nobody:nobody /opt/test 注释:关于授权nobody,我们先用id命令查看了nobody用户的信息,发现他的用户组也是nobody,我们要以这个为准。有些系统nobody用户组并非是nobody ; 第三步:启动服务器 第四步:访问Samba 服务器的共享; 1、在Linux 中您可以用下面的命令来访问; [root@localhost ~]# smbclient -L //liukai或 smbclient //192.168.0.94/test Password: 注:直接按回车 2、在Windows中,您可以用下面的办法来访问; \\liukai  或  \\192.168.0.94 3、说明:如果用了netbiosname,就可以用“\\主机名”来访问,如果没用netbiosname,就不能用主机名访问。   第三节、简单的密码验证服务器 修改smb.conf文件: security = user guest account = liukai encrypt PASSwords = yes smb passwd file = /etc/samba/smbpasswd 然后,建立一个新用户 useradd liukai passwd liukai 成功后,cat /etc/passwd | mksmbpasswd.sh > /etc/samba/smbpasswd smbpasswd -a liukai 这就成功地添加了一个smb用户。 重启服务,使用这个用户进行登录即可。    

    标签: samba 嵌入式

    上传时间: 2015-05-13

    上传用户:yangkang1192

  • Digital+Signal+Processing+for+RFID

    Identification is pervasive nowadays in daily life due to many complicated activities such as bank and library card reading, asset tracking, toll collecting, restricted access to sensitive data and procedures and target identification. This kind of task can be realized by PASSwords, bio- metric data such as fingerprints, barcode, optical character recognition, smart cards and radar. Radiofrequencyidentification(RFID)isatechniquetoidentifyobjectsbyusingradiosystems. It is a contactless, usually short distance, wireless data transmission and reception technique for identification of objects. An RFID system consists of two components: the tag (also called transponder) and the reader (also called interrogator).

    标签: Processing Digital Signal RFID for

    上传时间: 2020-06-08

    上传用户:shancjb