The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
标签: vulnerability i_nls_ct exploit command
上传时间: 2015-01-20
上传用户:aa17807091
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
标签: the embedded detects almost
上传时间: 2015-05-07
上传用户:comua
This class implements the same API as the Java 1.3 java.util.TimerTask. * Note that a TimerTask can only be scheduled on one Timer at a time, but * that this implementation does not enforce that constraint.
标签: TimerTask implements the class
上传时间: 2015-06-10
上传用户:无聊来刷下
fastDNAml is an attempt to solve the same problem as DNAML, but to do so faster and using less memory, so that larger trees and/or more bootstrap replicates become tractable. Much of fastDNAml is merely a recoding of the PHYLIP 3.3 DNAML program from PASCAL to C.
标签: fastDNAml attempt problem faster
上传时间: 2014-01-24
上传用户:bjgaofei
The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation stage.
标签: transforming two-stage However decoder
上传时间: 2015-07-05
上传用户:sevenbestfei
The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the largest correlation metric. Presently, only 8-PSK modulation is considered. Extensions to higher-order modulations can be implemented following a similar procedure.
标签: difference The algorithm the
上传时间: 2015-07-05
上传用户:qiaoyue
Computes the hafnian of a nonnegative integer matrix. Notes: Copy hafnian.c to main.c, in the same directory as Rothberg s code (see above). You can download the .tar directory with the code weighted-match.tar here. Then "make" the codes (this codes are in C, not C++). The program is then run by the command "wmatch".
标签: hafnian nonnegative the Computes
上传时间: 2013-12-23
上传用户:lmeeworm
use the ARM7 and SDT2.51 to show how to DIY,the ADS1.2 is as same as the SDT2.51
上传时间: 2014-01-10
上传用户:athjac
You can call MsgBoxEx instead of MsgBox MsgBoxEx will return the same vbMsgBoxResults as MsgBox, but adds the frm, Left, and Top parameters.
标签: MsgBoxEx MsgBox vbMsgBoxResults instead
上传时间: 2013-12-22
上传用户:zycidjl
SOUNDSC(Y,...) is the same as SOUND(Y,...) except the data is scaled so that the sound is played as loud as possible without clipping. The mean of the data is removed.
上传时间: 2015-10-28
上传用户:WMC_geophy