Addfilter is a command-line application which adds and removes filter drivers for a given drive or volume. It is intended to demonstrate how to insert a filter driver into the driver stack of a device. The sample illustrates how to do this by using the SetupDi APIs. The sample works on the x86 platform. It has only been tested in a 32-bit environment. Since Addfilter is not a driver, it does not deal with Plug and Play or Power Management. No INF file is needed to install this application.
标签: command-line application Addfilter drivers
上传时间: 2016-06-28
上传用户:源码3
Proceedings of Practice of Interesting Algorithms 2007 The editor assumes no responsibility for the accuracy, completeness or usefulness of the information disclosed in this volume. Unauthorized use might infringe on privately owned patents of publication right. Please contact the individual authors for permission to reprint or otherwise use information from their papers. First edition 2007 Publication Planned by Prof. Wenxin Li Edited by Yili Zhao All rights reserved by Artificial Intelligence Laboratory, Peking University June 26, 2007
标签: responsibility Proceedings Interesting Algorithms
上传时间: 2016-06-28
上传用户:wyc199288
Addfilter is a command-line application which adds and removes filter drivers for a given drive or volume.
标签: command-line application Addfilter drivers
上传时间: 2016-07-01
上传用户:王楚楚
(1) 编写一个代表圆柱体的Cylinder类,该类是Circle类的子类。Cylinder类包括圆柱体的高度变量height以及计算圆柱体的体积方法volume()和计算表面积的方法surfaceArea()。 (2) 编写测试Cylinder类的CylinderTest类,并在该类得main方法中调用Cylinder类的相关方法。 (3) 重写Point和Circle类的equals()、toString()方法,并测试这些方法的正确性。
上传时间: 2016-08-19
上传用户:moerwang
采用3D Bresenham算法在两点间划一直线 % This program is ported to MATLAB from: % B.Pendleton. line3d - 3D Bresenham s (a 3D line drawing algorithm) % ftp://ftp.isc.org/pub/usenet/comp.sources.unix/volume26/line3d, 1992 % % Which is referenced by: % Fischer, J., A. del Rio (2004). A Fast Method for Applying Rigid % Transformations to Volume Data, WSCG2004 Conference. % http://wscg.zcu.cz/wscg2004/Papers_2004_Short/M19.pdf
标签: Bresenham Pendleton program MATLAB
上传时间: 2013-12-10
上传用户:sz_hjbf
MTOOLS version 2.0 Mtools is a public domain collection of programs to allow Unix systems to read, write, and manipulate files on an MSDOS filesystem (typically a diskette). The following MSDOS commands are emulated: Mtool MSDOS name equivalent Description ----- ---- ----------- mattrib ATTRIB change MSDOS file attribute flags mcd CD change MSDOS directory mcopy COPY copy MSDOS files to/from Unix mdel DEL/ERASE delete an MSDOS file mdir DIR display an MSDOS directory mformat FORMAT add MSDOS filesystem to a low-level format mlabel LABEL make an MSDOS volume label. mmd MD/MKDIR make an MSDOS subdirectory mrd RD/RMDIR remove an MSDOS subdirectory mread COPY low level read (copy) an MSDOS file to Unix mren REN/RENAME rename an existing MSDOS file mtype TYPE display contents of an MSDOS file mwrite COPY low level write (copy) a Unix file to MSDOS
标签: collection programs version systems
上传时间: 2016-11-18
上传用户:wlcaption
"The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Series was - and still is - to provide tips, techniques, and algorithms for graphics programmers. All of the gems are written by programmers who work in the field and are motivated by a common desire to share interesting ideas and tools with their colleagues. Each volume provides a new set of innovative solutions to a variety of programming problems.
标签: The GRAPHICS Glassner started
上传时间: 2016-12-18
上传用户:firstbyte
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
标签: open-source encryption Features software
上传时间: 2013-12-20
上传用户:123啊
Very low cost, low component count charger/adapter – replaces linear transformer based solutions • Extremely simple circuit configuration designed for high volume, low cost manufacturing
标签: transformer low component solutions
上传时间: 2017-03-27
上传用户:2404
Very low cost, low component count charger/adapter – replaces linear transformer based solutions • Extremely simple circuit configuration designed for high volume, low cost manufacturing
标签: transformer low component solutions
上传时间: 2017-03-27
上传用户:lps11188