是用java和jsp實現的bbs論壇系統。 有注冊登陸模塊,瀏覽功能模塊,發帖回帖模塊,帖子管理模塊,論壇設置功能模塊,管理版塊功能模塊,用戶管理模塊。-is java and jsp realized bbs forum system. Registered landing module, navigation module, barred when posting module, message management module, the Forum set up functional modules, Management plate functional modules, user management module.
snmp4j
1.8.2版
The org.snmp4j classes are capable of creating, sending, and receiving SNMPv1/v2c/v3 messages. A SNMP message is composed of its message header and its PDU payload. This package contains three main groups of classes and interfaces:
CAN1.c and CAN2.c are a simple example of configuring a CAN network to
transmit and receive data on a CAN network, and how to move information to
and from CAN RAM message objects. Each C8051F040-TB CAN node is configured
to send a message when it s P3.7 button is depressed/released, with a 0x11
to indicate the button is pushed, and 0x00 when released. Each node also has
a message object configured to receive messages. The C8051 tests the
received data and will turn on/off the target board s LED. When one target
is loaded with CAN2.c and the other is loaded with CAN1.c, one target
board s push-button will control the other target board s LED, establishing
a simple control link via the CAN bus and can be observed directly on the
target boards.
www工具包. 這是W3C官方支持的www支撐庫. 其中提供通用目的的客戶端的WebAPI: complete HTTP/1.1 (with caching, pipelining, PUT, POST, Digest Authentication, deflate, etc), MySQL logging, FTP, HTML/4, XML (expat), RDF (SiRPAC), WebDAV, and much more
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.