一樂LIST 能夠返回你的Topic值, 得到message 的作者等功能
上傳時間: 2014-11-28
上傳用戶:wanqunsheng
snmp4j 1.8.2版 The org.snmp4j classes are capable of creating, sending, and receiving SNMPv1/v2c/v3 messages. A SNMP message is composed of its message header and its PDU payload. This package contains three main groups of classes and interfaces:
標簽: receiving creating classes capable
上傳時間: 2016-12-31
上傳用戶:qazxsw
CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.
標簽: CAN configuring and transmit
上傳時間: 2013-12-11
上傳用戶:weiwolkt
struts validator驗證框架 1、配置: * 加入國際化配置在struts-config.xml文件中,如: <message-resources parameter="messageResources" /> * 提供國際化資源文件 * 引入validator插件在struts-config.xml文件中,如: <plug-in className="org.apache.struts.validator.ValidatorPlugIn"> <set-property property="pathnames" value="/WEB-INF/validator-rules.xml,/WEB-INF/validation.xml"/> </plug-in> * 提供validation.xml和validator_rules.xml文件,將此文件拷貝到WEB-INF下 2、validator服務器端驗證 * 配置validation.xml文件 3、validator客戶端驗證(javascript) ) * 配置validation.xml文件 * 在jsp頁面中包含< html:javascript> * 對需要驗證的表單定義onsubmit事件,其中事件名稱為validate+ActionForm的名稱,如:validateLoginForm
標簽: struts-config validator struts xml
上傳時間: 2017-01-24
上傳用戶:silenthink
EJB3的入門資料,相當不錯的一個東東.具體包括SessionBean, message Driven Bean, EntityBean,是入門的首選
標簽: EJB3
上傳時間: 2013-12-17
上傳用戶:heart520beat
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789
以傳統的C/SDK 撰寫Windows 程序,最大的好處是可以清楚看見整個程序的來龍去脈 和消息動向,然而這些重要的動線在MFC 應用程序中卻隱晦不明,因為它們被Application Framework 包起來了。這一章主要目的除了解釋MFC 應用程序的長像,也要從MFC 源代 碼中檢驗出一個Windows 程序原本該有的程序進入點(WinMain)、視窗類別注冊 (RegisterClass)、窗口產生(CreateWindow)、消息循環(message Loop)、窗口函數 (WindowProcedure)等等動作,抽絲剝繭徹底了解一個MFC 程序的誕生與結束,以及生 命過程。
上傳時間: 2017-03-22
上傳用戶:athjac
Introduction Sometimes you may collide with the following problem: a third-party binary component or control embedded into your application displays windows (usually message boxes) that hang your code until they are closed. If you do not have the source code of this binary and one does not have a good API to change one’s bad behaviour programmatically, it can be a real headache using the one. A famous example of such a binary is the WebBrowser control in .NET.
標簽: Introduction third-party Sometimes following
上傳時間: 2013-12-31
上傳用戶:pinksun9
在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上傳時間: 2017-04-04
上傳用戶:xaijhqx