-
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽:
Sometimes
the
contents
desire
上傳時間:
2013-12-25
上傳用戶:playboys0
-
Networking for Dummies 8th Edition ,Written for even the most network-shy novice, this book begins with the most basic of basics and progresses through all the essentials, from cables, routers and hubs to building a wireless network.英文版 CHM格式
標簽:
network-shy
Networking
for
Dummies
上傳時間:
2015-12-16
上傳用戶:shus521
-
Core Java 2 Volume I - Fundamentals, Seventh Edition
Completely revised and up-to-date coverage of
Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection
Swing GUI development, including input validation and other enhancements
Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging
Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders
Regular expressions using the powerful java.util.regex package
Inner classes, reflection, and dynamic proxies
Application packaging and the Preferences API
標簽:
Fundamentals
Completely
up-to-date
coverage
上傳時間:
2016-01-02
上傳用戶:標點符號
-
cpress usb 芯片Vender 處理固件。
The purpose of this software is to demonstrate how
to implement vendor specific commands.
The following vendor specific commands are implemented:
A0 Firmware Upload/Download
A2 EEProm Load
A3 External Ram Load
A4 Set I2C Addr
A5 Get IIC Type (1 Byte or 2 Byte EEPROM)
A6 Get Chip Rev
A8 Renumerate
標簽:
demonstrate
implement
software
purpose
上傳時間:
2016-01-14
上傳用戶:stvnash
-
Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. A more detailed description of what mod_python can do is available in this O Reilly article.
標簽:
interpreter
Mod_python
mod_python
the
上傳時間:
2016-01-25
上傳用戶:yd19890720
-
『embedded systems building blocks, complete and ready-to-use modules in C, second edition』
- This second edition features revisions that support the latest version of the author s popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory
標簽:
ready-to-use
embedded
building
complete
上傳時間:
2014-12-04
上傳用戶:阿四AIR
-
thinkinjava2English
Thinking in Java,
2nd Edition, Release 11
To be published by Prentice-Hall mid-June, 2000
Bruce Eckel, President,
MindView, Inc.
Planet PDF brings you the Portable Document
Format (PDF) version of Thinking in Java (2nd
Edition). Planet PDF is the premier PDF-related
site on the web. There is news, software, white
papers, interviews, product reviews, Web links,
code samples, a forum, and regular articles by
many of the most prominent and respected PDF
experts in the world. Visit our sites for more detail:
http://www.planetpdf.com/
http://www.codecuts.com/
http://www.pdfforum.com/
http://www.pdfstore.com/
標簽:
thinkinjava2English
Prentice-Hall
published
Thinking
上傳時間:
2014-01-15
上傳用戶:ANRAN
-
This R2.9 revision of the CLID detector provides the TYPE 1 (on-hook, between first and second ring, or
before first ring) signal detection and returns the message raw byte data without parsing of particular fields
such as Message Type, Parameter(s) Type(s), etc. The decoding of the message meaning should be performed by the user application.主叫號碼識別CID算法for TI DSP
標簽:
the
revision
detector
provides
上傳時間:
2014-01-18
上傳用戶:天誠24
-
μC/OS-II Goals
Probably the most important goal of μC/OS-II was to make it backward compatible with μC/OS (at least from an
application’s standpoint). A μC/OS port might need to be modified to work with μC/OS-II but at least, the application
code should require only minor changes (if any). Also, because μC/OS-II is based on the same core as μC/OS, it is just
as reliable. I added conditional compilation to allow you to further reduce the amount of RAM (i.e. data space) needed
by μC/OS-II. This is especially useful when you have resource limited products. I also added the feature described in
the previous section and cleaned up the code.
Where the book is concerned, I wanted to clarify some of the concepts described in the first edition and provide
additional explanations about how μC/OS-II works. I had numerous requests about doing a chapter on how to port
μC/OS and thus, such a chapter has been included in this book for μC/OS-II.
標簽:
OS-II
compatible
important
Probably
上傳時間:
2013-12-02
上傳用戶:jkhjkh1982
-
Java & XML 2nd Edition
New chapters on Advanced SAX, Advanced DOM, SOAP and data binding, as well as new examples throughout, bring the second edition of Java & XML thoroughly up to date. Except for a concise introduction to XML basics, the book focuses entirely on using XML from Java applications. It s a worthy companion for Java developers working with XML or involved in messaging, web services, or the new peer-to-peer movement
標簽:
Advanced
chapters
Edition
binding
上傳時間:
2014-07-26
上傳用戶:tfyt