This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as some kind of dump protection. The way to get this done is very different on NT and 9x machines.
标签: operation Windows example process
上传时间: 2013-12-17
上传用户:wang0123456789
NORTi3 is a realtime multitasking operating system conforming to the micro-ITRON 3.0 specification. NORTi3 is divided into two packages: NORTi3 Standard and NORTi3 Extended. The product NORTi3 Extended has implemented all the system calls of level E placed as "added and extended functions” in the micro-ITRON specification as well as the system calls equivalent to level X.
标签: specification multitasking micro-ITRON conforming
上传时间: 2014-01-14
上传用户:saharawalker
he LPC932 can be used to create a Pulse Width Modulated PWM signal. That s an analog signal, with only 2 discrete levels, for example 0V and 5V and a constant period. The current value of this signal at a certain poiTnt of time is proportional to its Duty Cycle. That s the High Time during one period divided by the period. It can also be calculated as the average value during a particular period. That means after low pass filtering, (e.g. RC circuit) the signal becomes analog, with an actual value controlled by the microcontroller. The PWM functionality enables the LPC932 to control for example the speed of DC motors or the brightness of electric lighting.
标签: signal Modulated analog create
上传时间: 2015-05-14
上传用户:CHINA526
基于基本遗传算法的函数最优化SGA.C A Function Optimizer using Simple Genetic Algorithm developed from the Pascal SGA code presented by David E.Goldberg
标签: Algorithm Optimizer developed Function
上传时间: 2015-05-29
上传用户:aa54
某幼儿园按如下方法依次给A,B,C,D,E五个小孩发糖果。将全部糖果的一半再加二分之一块糖果发给第一个小孩;将剩下糖果的三分之一再加三分之一块糖果发给第二个小孩;将剩下糖果的四分之一再加四分之一块糖果发给第三个小孩;将剩下糖果的五分之一再加五分之一块糖果发给第四个小孩;将最后剩下的11块糖果发给第五个小孩。每个小孩得到的糖果数均为整数。试确定原来共有多少块糖果?每个小孩各得到多少块糖果? 要求结果的输出格式为 sum=糖果总数 xa=A得到的糖果数 xb=B得到的糖果数 xc=C得到的糖果数 xd=D得到的糖果数 xe=E得到的糖果数
标签:
上传时间: 2015-06-02
上传用户:叶山豪
89S51 与数码管显示器以及键盘SW 对应引脚的联机为: P0.0-------------------------数码管显示器的a脚 P0.1-------------------------数码管显示器的b脚 P0.2-------------------------数码管显示器的c脚 P0.3-------------------------数码管显示器的d脚 P0.4-------------------------数码管显示器的e脚 P0.5-------------------------数码管显示器的f脚 P0.6-------------------------数码管显示器的g脚 P0.7-------------------------数码管显示器的dp脚 ; P2.2-------------------------数码管显示器1的驱动脚 P2.3-------------------------数码管显示器2的驱动脚 P2.4-------------------------数码管显示器3的驱动脚 P2.5-------------------------数码管显示器4的驱动脚 P2.6-------------------------数码管显示器5的驱动脚 P2.7-------------------------数码管显示器6的驱动脚 ; P2.2-------------------------键盘SW1 P2.3-------------------------键盘SW2 P2.4-------------------------键盘SW3 P2.5-------------------------键盘SW4 P2.6-------------------------键盘SW5 P2.7-------------------------键盘SW6
上传时间: 2013-12-29
上传用户:1583060504
本书第一部分讲述的是传统的网络接口N e t B I O S、重定向器以及通过重定向器进行的各类 网络通信。尽管本书大部分内容均围绕Wi n s o c k编程这一主题展开,但是, A P I比起Wi n s o c k 来,仍然具有某些独到之处
上传时间: 2015-07-08
上传用户:恋天使569
本附录介绍一些新的A P I函数,有了这些函数,便可在自己的计算机上对I P协议统计情况 进行查询和管理。它们有助于获得下面的能力: ■ I p c o n f i g . e x e(或适用于微软Windows 95的Wi n i p c f g . e x e):显示I P配置信息,允许释放 和更新D H C P分配的I P地址。 ■ N e t s t a t . e x e:显示T C P连接表、U D P监听者表以及I P协议统计情况。 ■ R o u t e . e x e:显示并处理网络路由表。 ■ A r p . e x e:显示并修改供“地址解析协议”(A R P)使用的I P到物理地址翻译表。
标签: 函数
上传时间: 2014-01-12
上传用户:569342831
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
pop3代理服务器源代码One of the most powerful features of Pop3 Agent is a naive Bayes filter, that is capable of recognizing spam e-mails after appropriate training. Pop3 Agent uses an embedded Firebird database server. Of course, you can configure Pop3 Agent to work with an existing server if there is another Interbase/Firebird installation available in your network. Open the Pop3 Agent home directory, delete or rename gds32.dll and ib_util.dll, and set the INI file parameter FBembedded=0.
标签: features powerful filter Agent
上传时间: 2014-01-10
上传用户:yoleeson