亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Tool-play

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    標簽: the resource Netcat Swiss

    上傳時間: 2017-04-02

    上傳用戶:onewq

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    標簽: present modalities existence different

    上傳時間: 2014-03-04

    上傳用戶:15736969615

  • 在網絡安全中經常會遇到rootkit

    在網絡安全中經常會遇到rootkit,NSA安全和入侵檢測術語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    標簽: rootkit 網絡安全

    上傳時間: 2017-04-04

    上傳用戶:xaijhqx

  • CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a sm

    CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a smart tool easy in use. Supports 5 operators, parenthesis, 18 mathematical functions and user-defined variables

    標簽: mathematical CalcExpress interpreter expressions

    上傳時間: 2014-12-08

    上傳用戶:希醬大魔王

  • The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and da

    The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s  examining the processor state whatever the execution mode (monice)  connecting to monice using mdi-server and using a gdb client on the processor to step and break accurately whatever the execution mode  running semi-hosted applications  fl ash write tool  memory testing (MT command)  real-time traces: has not been built in CPU (Config3_TL=0) and only supported by MajicPLUS probes (maybe built into emulator?)

    標簽: interface processor allowing access

    上傳時間: 2013-12-19

    上傳用戶:youke111

  • Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world.

    Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world. A command can be send by mobile phone through sms.Based on the command ur pc performs tasks such as shut down,open file,play music etc.

    標簽: your Phone-it controls anywhere

    上傳時間: 2017-04-13

    上傳用戶:四只眼

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    標簽: Peripheral peripheral and Examples

    上傳時間: 2014-01-24

    上傳用戶:fandeshun

  • JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The pro

    JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The product was primarily written to allow Warfare to render charts from data sources, which as a tool kit is specifically design for people with no programming knowledge

    標簽: JWebChart Servlet complex package

    上傳時間: 2013-12-19

    上傳用戶:Pzj

  • 基于struts框架制作

    基于struts框架制作,采用MVC模式,工程附加后把tool包下的jdbc文件改動一下就可以了,改到自己的數據庫,

    標簽: struts

    上傳時間: 2017-05-02

    上傳用戶:Shaikh

  • this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect le

    this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect learning tool for beginning programmers who want to develop their own programming capabilities, and for developers who want to get up-to-speed with C++Builder quickly and easily.

    標簽: step-by-step programming learning Borland

    上傳時間: 2014-01-04

    上傳用戶:gxf2016

主站蜘蛛池模板: 鄱阳县| 儋州市| 武夷山市| 两当县| 军事| 巫溪县| 襄汾县| 华阴市| 华容县| 德令哈市| 噶尔县| 林芝县| 临夏县| 汾西县| 梅州市| 和硕县| 霸州市| 望江县| 阳原县| 苗栗县| 察雅县| 新绛县| 东光县| 黎川县| 镇雄县| 石台县| 涞水县| 哈巴河县| 凤山市| 邯郸县| 彭水| 黄陵县| 滨海县| 治县。| 齐齐哈尔市| 灵台县| 万宁市| 古蔺县| 大新县| 中超| 图木舒克市|