资源列表
UDPgjq
- UDP攻击器,易语言编写的UDP攻击器UDP攻击器,易语言编写的UDP攻击器-UDP攻击器,易语言编写的UDP攻击器
BST
- A Complete Binary Search Tree Program including insertion, deletion at root, leave or any node.
CRC32
- 可以检测程序的CRC32,包括内存CRC32,通过对比可以检测出是否被修改,从而达到反破解-Procedure can detect CRC32, including memory CRC32, by contrast can be modified to detect whether, to achieve the anti-crack
ek111065
- 用易编写的小例子,效果:执行外部程序.zip易语言存在误报请谨慎下载-Easy to use to write a small example, effect: execute external programs. Zip easy language in the presence of false positives carefully please download
sub-change-way
- vbs之类蠕虫病毒的编写 文章标题之所以称为类蠕虫,是因为攻击代码 即主题代码还没实现-vbs like worm to write the title of the article is called the class of worms, because the attack code, subject code not achieve
exp11-5
- 支持多client的并发访问的server端程序,并发访问-Base support concurrent access to multi-client server-side programs, concurrent access
Retina
- A very good code for identification and classification of retinal vascular
DiskVariable
- 实现了文件随机读写的一个C++类。使用CDiskVariable类操作磁盘,可以随机读写文件。 使用CDiskMap可以将文件映射到数组中。在CDiskMap类被析构的时候,数据自动存入文件的指定地址。-Random read and write files to achieve a C++ classes. Use CDiskVariable class action disk, you can randomly read and write files. Use CDiskMap Fil
Cyuyan1
- C语言中个打开文件,放入文本的源代码,包括计算机考试的一些题目-Open the file C language Uno months, into the text of the source code
string
- 1、定义并实现顺序串结构; 2、求模式串的next值; 3、求模式串的nextval值; 4、实现KMP算法;-1, in order to define and implement string structure 2, find the next pattern string value 3, find the pattern string nextval values 4, to achieve KMP algorithm
Cycles
- three LCCWIN-32 macro-implementations for measuring cpu-cycles:
IE--87493Catch-258073AudioYSE529939
- 源码IE 87493Catch-258073AudioYSE529939是个不错的源码,同学们用来学习是不错的选择-Source- IE audioyse529939 catch 87493-87493 is a good source, the students used to learn is a good choice
