This worm file is disseminated except that through MIRC and outlook Express. This worm will duplicate red.exe in the computer arriving and infecting too, and in mirc catalogue in the system, produce a script.ini file, let the worm be disseminated through Mirc communication software by this.
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such as Kernel Configuration, Networking, User Administration, and File Management are covered extensively for the administrator who wants a variety of options to choose from for best performance. The book also provides in-depth coverage of configuring and optimizing mail, DNS, HTTP and other services many companies deploy across their intranet and on the Internet
數據異常處理。The main source file is "dabort.s": with suitable -PreDefines or
a corresponding "options-setting" file, it assembles to the data
abort veneer. This is described in detail in the documentation.
The "dabort.h" file contains definitions of some constants used
in the data abort veneer s interface to the rest of the system
- again, this is described in the documentation.
The "option.s" file is an example "options-setting" file.
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
This document describes the interface between HLA and Linux via direct system calls. The HLA Standard
Library provides a header file with a set of important constants, data types, and procedure prototypes that you can use
to make Linux system calls.
These are matlab and simulink files to model the membrane crystallization system, including the matlab file to get the optimation point of this system, and 3 simulink files, which are static model and 2 dynamic models. There has PID control and feed forward control for the dynamic models.
A Perl-based statistics management system designed for academic competition tournaments. These tournaments, which are called "College Bowl," "quiz bowl," and a variety of other names, involve teams playing against each other in either timed or untime
The latest file releases
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola.
It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert
batch file.
This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine.
Tool chain
----------
FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM
-> MPASM FUZZY.ASM -> INTEL HEX
Fuzzy input registers
---------------------
current_ins 1..8 x 8-bit raw inputs
Fuzzy inference function
------------------------
FuzzyEngine
Fuzzy output registers
----------------------
cog_outs 1..8 x 8-bit raw outputs