搜索资源列表
如何在LINUX下实现硬件的自动检测
- 如何在LINUX下实现硬件的自动检测?这是一个问题,如何解决,请看书!-How to do hardware detection in linux? It s a question. How to solve it? Just read the book!
HackIMUT
- 我们学校的选课系统(http://202.207.16.59)真气人啊,我还没接到通知呢,别人就把选修课都选满了,选不到我心爱的选修课,怎么办? 为了解决这个问题,我特意编写了这个玩艺,因为很多人都没有改默认密码(默认密码就是学号),所以我就可以利用穷举搜索出大部分人都选的什么课,然后。。。。呵呵。。。就参考一下。 估计大家下到这个软件的时候,学校就应该有反应了,也许软件会失效,但是,可以参考一下里面的代码,也许稍微改改,就能适用于你们自己的学校哦。-the Course of our
UserFun
- This 4 part series will discuss the Windows access control model and how it is implemented in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descr iptors. We will solve
boost
- This 4 part series will discuss the Windows access control model and how it is implemented in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descr iptors. We will solve
OSdeadlock
- Deadlock and how to solve it with mutex a client request bank command like DEPOSIT CREATE TRANSFER WITHDRAW and 4 server server 1 simple server. server 2 shows wrong answer an withdraw(2 terminal - 2 threads) server 3 solve 2 server 4 sol
Unix_Shell_Programming
- Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power o
WPA2mimapojie
- 首先大家要明白一种数学运算,它叫做哈希算法(hash),这是一种丌可逆运算,你丌能通过运算结果来求解出原来癿未知数是多少,有时我们还需要丌同癿未知数通过该算法计算后得到癿结果相同,即你丌太可能找到两个丌同癿值通过哈希得到同一个结果。哈希是一类算法癿统称,通常哈希算法都是公开癿,比如 MD5,SHA-1 等等。-First we need to understand a mathematical operation, it is called the hash algorithm (hash),
AccessConflict
- 解决多线程存取访问冲突的一个VC++实例,称之为Access Conflict,如图演示的功能,可看到线程整齐输出,已解决了冲突问题,如何实现呢?请下载源码一看究竟。-Solve multi-threaded access to an access violation VC++ instance, called Access Conflict, as demonstrated capabilities, you can see the thread neat output, the confl
Playfair_deepali
- This Document gives the algorithm and detail steps of Playfair cipher and how to solve the problem related it.
