亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Tool-play

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    標簽: the resource Netcat Swiss

    上傳時間: 2017-04-02

    上傳用戶:onewq

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    標簽: present modalities existence different

    上傳時間: 2014-03-04

    上傳用戶:15736969615

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

  • CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a sm

    CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a smart tool easy in use. Supports 5 operators, parenthesis, 18 mathematical functions and user-defined variables

    標簽: mathematical CalcExpress interpreter expressions

    上傳時間: 2014-12-08

    上傳用戶:希醬大魔王

  • The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and da

    The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s  examining the processor state whatever the execution mode (monice)  connecting to monice using mdi-server and using a gdb client on the processor to step and break accurately whatever the execution mode  running semi-hosted applications  fl ash write tool  memory testing (MT command)  real-time traces: has not been built in CPU (Config3_TL=0) and only supported by MajicPLUS probes (maybe built into emulator?)

    標簽: interface processor allowing access

    上傳時間: 2013-12-19

    上傳用戶:youke111

  • Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world.

    Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world. A command can be send by mobile phone through sms.Based on the command ur pc performs tasks such as shut down,open file,play music etc.

    標簽: your Phone-it controls anywhere

    上傳時間: 2017-04-13

    上傳用戶:四只眼

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    標簽: Peripheral peripheral and Examples

    上傳時間: 2014-01-24

    上傳用戶:fandeshun

  • JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The pro

    JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The product was primarily written to allow Warfare to render charts from data sources, which as a tool kit is specifically design for people with no programming knowledge

    標簽: JWebChart Servlet complex package

    上傳時間: 2013-12-19

    上傳用戶:Pzj

  • 基于struts框架制作

    基于struts框架制作,采用MVC模式,工程附加后把tool包下的jdbc文件改動一下就可以了,改到自己的數據庫,

    標簽: struts

    上傳時間: 2017-05-02

    上傳用戶:Shaikh

  • this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect le

    this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect learning tool for beginning programmers who want to develop their own programming capabilities, and for developers who want to get up-to-speed with C++Builder quickly and easily.

    標簽: step-by-step programming learning Borland

    上傳時間: 2014-01-04

    上傳用戶:gxf2016

主站蜘蛛池模板: 游戏| 如皋市| 雷波县| 平塘县| 章丘市| 广宁县| 沭阳县| 潮安县| 南宁市| 长丰县| 城固县| 涟水县| 南川市| 横山县| 广宗县| 安溪县| 建瓯市| 扎囊县| 瑞丽市| 锡林郭勒盟| 博乐市| 台前县| 台前县| 诸暨市| 永济市| 右玉县| 富蕴县| 凤台县| 东城区| 嘉祥县| 丹阳市| 沧源| 合作市| 翁源县| 霍山县| 淅川县| 昆明市| 关岭| 深州市| 冕宁县| 永川市|