在Linux系統上使用Socket接口實現FTP客戶端和服務器的程序,使客戶端可以連接至服務器,并且可以進行一些FTP的基本操作。客戶端和服務器的命令通道和數據通道需要分離,支持以下一些FTP命令: GET:取遠方的一個文件 put:傳給遠方一個文件 pwd:顯示遠方當前目錄 dir:列出遠方當前目錄 cd:改變遠方當前目錄 ?:顯示提供的命令 quit:退出返回 !dir,列出本地當前目錄。
上傳時間: 2016-07-29
上傳用戶:huangld
If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to GET started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile phones, anti-lock brakes, and even a few toasters. The military uses embedded software to guide missiles, detect enemy aircraft, and pilot UAVs. Communication satellites, deep-space probes, and many medical instruments would have been nearly impossible to create without embedded software.
標簽: familiarity programming experience dominant
上傳時間: 2013-12-11
上傳用戶:362279997
ajax打造的動態計數器,首次使用了交互的原理,原創作品,市面上相同的插件代碼很少見哦~~~~ 1.以當前文件的文件名為統計基礎。 2.ajax發送方式可以是GET/post,調用非常簡單: 寫在window.onload里是為了頁面加載完成后才開始統計。 3.返回結果為純數字,即當前頁面的訪問次數 4,單個頁面對某一用戶一天只記數一次(通過cookie方式實現) 注:如果客戶端禁止了cookie,則通過服務器端進行判斷,確保一個頁面一天只記一次數。 其它:只做了一個單個頁面訪問次數的計數器,如果想要統計具體訪問信息,可以自己寫相應的后臺頁面,加入相應的功能。
上傳時間: 2016-09-27
上傳用戶:waizhang
Linux下的tree命令,同window,功能更強大! 1、下載tree-1.5.1.1源程序 2、解壓源碼到工作目錄tar zxvf tree-1.5.1.1.tgz 3、在tree-1.5.1.1目錄交叉編譯:make CC=arm-linux-gcc 4、安裝:make prefix=/home/xxxx/rootfs install Ubuntu下 直接 apt-GET install tree 即可安裝最新的tr
上傳時間: 2016-09-27
上傳用戶:wangzhen1990
MATLAB的SVM算法實現,Matlab Support Vector Machine Toolbox,This toolbox was designed as a teaching aid, which matlab is particularly good for since source code is relatively legible and simple to modify. However, it is still reasonably fast if used with the supplied optimiser. However, if you really want to speed things up you should consider compiling the matrix composition routine for H into a mex function. Then again if you really want to speed things up you probably shouldn t be using matlab anyway... GET hold of a dedicated C program once you understand the algorithm.
上傳時間: 2013-12-20
上傳用戶:jkhjkh1982
This a simple database management system. It doesn t use any other code (i.e. ODBC, ADO, etc.) and has it s own database file format. I wrote it because I found the other DBMSs code too bulky and hard to debug. It s designed for small applications and I doubt it could handle anything on a large scale. A sample program included in the .zip shows how everything works. The database project is a library project, so you ll have to compile and link with the .lib file to GET everything working. Pros: - You have the source code so you know exactly what it is doing - Database files are very small - Small and fast code Cons: - Can t handle large amounts of records (more than 65000ish) - Doesn t support SQL (you have to search the database by cycling through the records and testing them against your constraints) - Each database file can only have one table.
標簽: i.e. management database simple
上傳時間: 2016-10-02
上傳用戶:851197153
Given Perl s natural fit for web applications development, it s no surprise that Perl is also a natural choice for web services development. It s the most popular web programming language, with strong implementations of both SOAP and XML-RPC, the leading ways to distribute applications using web services. But books on web services focus on writing these applications in Java or Visual Basic, leaving Perl programmers with few resources to GET them started. "Programming Web Services with Perl" changes that, bringing Perl users all the information they need to create web services using their favorite language.
標簽: Perl applications development surprise
上傳時間: 2014-11-21
上傳用戶:xiaoyunyun
編寫漏洞掃描器探查遠程服務器上可能存在的具有安全隱患的文件是否存在,它的socket建立過程和上面 的端口掃描器是相同的,所不同的是漏洞掃描器通常使用80端口,然后對這個端口發送一個GET文件的請求,服務器接收到請求會返回文件內容,如果文件不存 在則返回一個錯誤提示,通過接收返回內容可以判斷文件是否存在。發送和接收數據需要使用函數send()和recv(),另外對流中存在的字符串進行判斷 需要使用函數strstr(),這除了需要具備socket函數庫的知識以外,還需要一些有關string函數庫的知識。
上傳時間: 2013-12-08
上傳用戶:
For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 32768 KB One day, CYJJ found an interesting piece of commercial from newspaper: the Cyber-restaurant was offering a kind of "Lunch Special" which was said that one could "buy one GET two for free". That is, if you buy one of the dishes on their menu, denoted by di with price pi , you may GET the two neighboring dishes di-1 and di+1 for free! If you pick up d1, then you may GET d2 and the last one dn for free, and if you choose the last one dn, you may GET dn-1 and d1 for free. However, after investigation CYJJ realized that there was no free lunch at all. The price pi of the i-th dish was actually calculated by adding up twice the cost ci of the dish and half of the costs of the two "free" dishes. Now given all the prices on the menu, you are asked to help CYJJ find the cost of each of the dishes.
標簽: Limit following solving problem
上傳時間: 2014-01-12
上傳用戶:362279997
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely GET a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高級程序設計 里面自代源碼
標簽: restriction Explorer Internet security
上傳時間: 2016-11-18
上傳用戶:源弋弋