搜索结果
找到约 36 项符合
Someone 的查询结果
按分类筛选
Linux/Unix编程 After decades of war one company, who had gained powerful supplying both sides with weaponary, steps
After decades of war one company, who had gained powerful supplying both sides with weaponary, steps forwards and crushes both warring factions in one swift movement. Using far superior weaponary and AI craft, the company was completely unstoppable and now no one can stand in their way. Thousands be ...
Java编程 A bluetooth SMS patcher Java ME application I made quickly after I thought about making one. What i
A bluetooth SMS patcher Java ME application I made quickly after I thought about making one.
What is does is to use JSR-82 (Bluetooth API) to send a String msg, String dest to another phone running shin-chan, and this phone will try to send it as SMS using JSR-135 (WMA).
The upload is a Netbeans 6. ...
文章/文档 What happens with your machine when you need to move away from the computer for 10 or more minutes?
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data?
Maybe you need a computer locking tool that is small and easy to use yet powerful ...
其他嵌入式/单片机内容 Full ARM920T S3C2443 ( Magellan Maestro 4245/4250 ) WinCE FileBackup of stored "Windows" path. Hope
Full ARM920T S3C2443 ( Magellan Maestro 4245/4250 ) WinCE FileBackup of stored "\Windows" path. Hope is for someone needfull. Sorry for my bad english... come from germany... greetings to all develop s here..
书籍 GSM+Networks
Someone who wants to get to know the customs of a country frequently
receives the advice to learn the language of that country. Why? Because the dif-
ferences that distinguish the people of one country from those of another are
reflected in the language. For example, the people of the islands of the ...
书籍 Smart Grid Security
The field of cyber security, or information security, or information
assurance, depending on your preference, is an interdisciplinary one.
It is part computer science, part statistics, part psychology, part law,
and a part of many other fields. Moreover, any cyber security practi-
tioner needs to kn ...