This worm file is disseminated except that through MIRC and outlook Express. This worm will duplicate red.exe in the computer arriving and infecting too, and in mirc catalogue in the system, produce a script.ini file, let the worm be disseminated through Mirc communication software by this.
標簽: This worm disseminated duplicat
上傳時間: 2017-01-13
上傳用戶:dbs012280
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such as Kernel Configuration, Networking, User Administration, and File Management are covered extensively for the administrator who wants a variety of options to choose from for best performance. The book also provides in-depth coverage of configuring and optimizing mail, DNS, HTTP and other services many companies deploy across their intranet and on the Internet
標簽: administrator Unleashed Edition written
上傳時間: 2017-01-13
上傳用戶:來茴
數據異常處理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-setting" file, it assembles to the data abort veneer. This is described in detail in the documentation. The "dabort.h" file contains definitions of some constants used in the data abort veneer s interface to the rest of the system - again, this is described in the documentation. The "option.s" file is an example "options-setting" file.
標簽: corresponding PreDefines options-s suitable
上傳時間: 2013-12-03
上傳用戶:星仔
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789
This document describes the interface between HLA and Linux via direct system calls. The HLA Standard Library provides a header file with a set of important constants, data types, and procedure prototypes that you can use to make Linux system calls.
標簽: HLA describes interface document
上傳時間: 2013-12-24
上傳用戶:shus521
These are matlab and simulink files to model the membrane crystallization system, including the matlab file to get the optimation point of this system, and 3 simulink files, which are static model and 2 dynamic models. There has PID control and feed forward control for the dynamic models.
標簽: crystallization including the simulink
上傳時間: 2017-04-13
上傳用戶:ljt101007
A Perl-based statistics management system designed for academic competition tournaments. These tournaments, which are called "College Bowl," "quiz bowl," and a variety of other names, involve teams playing against each other in either timed or untime The latest file releases
標簽: competition tournaments Perl-based statistics
上傳時間: 2017-05-10
上傳用戶:問題問題
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
標簽: fuzzy development implements PIC-based
上傳時間: 2014-01-18
上傳用戶:caozhizhi
test1 System will automatically delete the directory of debug and release, so please do not put files on these two directory.
標簽: automatically directory release System
上傳時間: 2013-12-22
上傳用戶:baiom