Base64 demonstrates how easy it is to decipher
plaintext usernames and passwords. Never login to a public network resource
unless some type of encryption is being used, secure socket layer is one example.
Most FTP sites also use plaintext passwords.
This little program shows how to use COM technology in
Win32Asm. When it s run it lets the user freely decide
about the presence of the program with the WS_EX_TOOLWINDOW
style on the taskbar. The main goal is to show the easiest
possible example instead of killing people with the details
about virtual tables, polymorphism, inheritance and using
nested macros etc., etc.
WSP is an HTTP to WSP proxy that can be used to forward HTTP requests to WSP, which is used in WAP 1.x. It may be called a reverse WAP gateway, and enables you to test or browse WAP sites with HTTP tools. It also can be used with penetration test tools.
This ZIP file contains the support files for programming the Infineon C167CR CAN interface. Refer to Application Note 115a for details of this example code.
This ZIP file contains the support files for programming the Infineon C167CR CAN interface. Refer to Application Note 115a for details of this example code.
this is part 2
This example demonstrates how to erase, write, and read the on-chip 640-byte EEPROM Data Memory of the Analog Devices ADuC812, ADuC814, ADuC816, and ADuC824 devivces. This example includes a µ Vision2 Project with a target for each supported device.
How to Use Tables With the JTable (in the API reference documentation) class you can display tables of data, optionally allowing the user to edit the data. JTable doesn t contain or cache data it s simply a view of your data. Here s a picture of a typical table displayed within a scroll pane