虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

SEND

  • 客户通过Socket(InetAddress,port)建立与服务器的连接。服务器与客户都通过构造BufferedReader,PrintWriter来建立输入输出流

    客户通过Socket(InetAddress,port)建立与服务器的连接。服务器与客户都通过构造BufferedReader,PrintWriter来建立输入输出流,然后双方通过该输入输出流来相互传递信息,一旦收到客户方的连接请求,服务器accept()方法返回一个新建的Socket对象。客户端然后向服务器发送消息,比如注册,登录,查找好友等,服务器收到来自客户的请求后,针对不同的消息处理请求, 虽然UDP不可靠但是对于icq可靠性并不太重要,而且UDP快速,所以客户间发送信息通过UDP。用户登录时通过类DatagramPacket和DatagramSocket创建UDP包括其本地接受端口以及发送端口,默认端口为5000和5001,通过取得的好友的IP地址来向好友发送消息(SEND(DatagramPacket)和接受消息(receive(DatagramPacket))。当用户通过UDP收到消息后,可以通过DatagramPacket的方法InetAddress getAddress()得到对方的ip地址,通过对好友列表比较以判断是谁并提示用户收到某某的消息,然后用户选择该用户查看消息,如果好友列表没有该人就显示收到陌生人的消息。用户可以按陌生人按钮查看消息。

    标签: BufferedReader InetAddress PrintWriter Socket

    上传时间: 2016-10-26

    上传用户:familiarsmile

  • 编写漏洞扫描器探查远程服务器上可能存在的具有安全隐患的文件是否存在

    编写漏洞扫描器探查远程服务器上可能存在的具有安全隐患的文件是否存在,它的socket建立过程和上面 的端口扫描器是相同的,所不同的是漏洞扫描器通常使用80端口,然后对这个端口发送一个GET文件的请求,服务器接收到请求会返回文件内容,如果文件不存 在则返回一个错误提示,通过接收返回内容可以判断文件是否存在。发送和接收数据需要使用函数SEND()和recv(),另外对流中存在的字符串进行判断 需要使用函数strstr(),这除了需要具备socket函数库的知识以外,还需要一些有关string函数库的知识。

    标签: 编写 漏洞 扫描器 安全隐患

    上传时间: 2013-12-08

    上传用户:

  • 抓包代码 那段代码

    抓包代码 那段代码,是我自己写的。这两个是东西是完成SEND和RECV两个地方,所以返回的地址不一样。这才搞出来那么多代码来

    标签: 代码

    上传时间: 2016-11-04

    上传用户:asddsd

  • 源码..C#开发的手机短信发送接收程序

    源码..C#开发的手机短信发送接收程序,有兴趣朋友可以研究下-C# development of the SMS to SEND and receive proceedings, interested friends under study

    标签: 源码 手机短信 发送接收程序

    上传时间: 2014-01-24

    上传用户:cc1

  • BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that th

    BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of email with filters, searches, and more Rev up your mobile gaming--whether you re an arcade addict or poker pro Browse the web, chat over IM, and keep up with news and weblogs Work with office documents, spell check your messages, and SEND faxes Become more secure, lock down your BlackBerry and stash secure information somewhere safe Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS) Create web sites that look great on a BlackBerry Develop and deploy BlackBerry applications

    标签: BlackBerry computing enhance mobile

    上传时间: 2016-12-07

    上传用户:GavinNeko

  • 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr

    加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encryption means that pegwit allows you to keep the information in files you SEND by email (or other means) confidential. Eavesdroppers will not be able to read the email. Authentication allows you to check that a file has not been tampered with (changed) since it was signed.

    标签: authentication encryption performing program

    上传时间: 2016-12-12

    上传用户:franktu

  • [解决方法] 对上述程序改动如下: 发送端: MMM SENDBag ZeroMemory(&SENDBag,sizeof(SENDBag)) .............

    [解决方法] 对上述程序改动如下: 发送端: MMM SENDBag ZeroMemory(&SENDBag,sizeof(SENDBag)) ............. int SEND = 0 while(SEND<sizeof(MMM)) { int nCharSEND=SEND(m_hSocket,(char*)(&SENDBag+SEND),sizeof(MMM)-SEND,0) SEND+=nCharSEND } 接收端: MMM RecvBag ZeroMemory(&RecvBag,sizeof(RecvBag)) recv写法同上while... 此方法适合传送结构体的实现. 赶快试试看.

    标签: SENDBag ZeroMemory sizeof MMM

    上传时间: 2013-12-03

    上传用户:三人用菜

  • The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: , in zip file under C:

    The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person who SENDs one name and SEND the addressee for this mail of worm s mail automatically, the worm will open the selfish calculations constantly too.

    标签: worm duplicate catalogue WINNT

    上传时间: 2017-01-13

    上传用户:aig85

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who SENDs one name and SEND the addressee for this mail of worm s mail automatically.

    标签: catalogue starting produce WINDOWS

    上传时间: 2013-12-18

    上传用户:wang5829

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to SEND a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    标签: CAN configuring and transmit

    上传时间: 2013-12-11

    上传用户:weiwolkt