eflow.plg

来自「从国外网站上下载的关于 逆向工程和协议分析练习 的一个分析文档 对你的加密与解密」· PLG 代码 · 共 45 行

PLG
45
字号
<html>
<body>
<pre>
<h1>Build Log</h1>
<h3>
--------------------Configuration: eflow - Win32 Debug--------------------
</h3>
<h3>Command Lines</h3>
Creating temporary file "C:\DOCUME~1\lgx\LOCALS~1\Temp\RSP206.tmp" with contents
[
/nologo /MLd /W3 /Gm /GX /ZI /Od /D "WIN32" /D "_DEBUG" /D "_CONSOLE" /D "_MBCS" /Fp"Debug/eflow.pch" /Yu"stdafx.h" /Fo"Debug/" /Fd"Debug/" /FD /GZ /c 
"E:\hack\eflow\eflow\eflow.cpp"
]
Creating command line "cl.exe @C:\DOCUME~1\lgx\LOCALS~1\Temp\RSP206.tmp" 
Creating temporary file "C:\DOCUME~1\lgx\LOCALS~1\Temp\RSP207.tmp" with contents
[
kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib ws2_32.lib /nologo /subsystem:console /incremental:yes /pdb:"Debug/eflow.pdb" /debug /machine:I386 /out:"Debug/eflow.exe" /pdbtype:sept 
.\Debug\crypt.obj
.\Debug\debug.obj
.\Debug\eflow.obj
.\Debug\Getopt.obj
.\Debug\main.obj
.\Debug\md5.obj
.\Debug\network.obj
.\Debug\options.obj
.\Debug\packet.obj
.\Debug\service.obj
.\Debug\StdAfx.obj
]
Creating command line "link.exe @C:\DOCUME~1\lgx\LOCALS~1\Temp\RSP207.tmp"
<h3>Output Window</h3>
Compiling...
eflow.cpp
Linking...
LINK : fatal error LNK1168: cannot open Debug/eflow.exe for writing
Error executing link.exe.



<h3>Results</h3>
eflow.exe - 1 error(s), 0 warning(s)
</pre>
</body>
</html>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?