代码搜索:Command

找到约 10,000 项符合「Command」的源代码

代码结果 10,000
www.eeworm.com/read/349103/10851677

scr cnt-seq.scr

/************************************************************************/ /* Count Zeros - Sequential */ /************************************************************************/ /* */
www.eeworm.com/read/349103/10851684

scr cnt-combin.scr

/************************************************************************/ /* Count Zeros - Combinational Version */ /************************************************************************/ /*
www.eeworm.com/read/349030/10855314

1 runscript.1

.\" This file Copyright 1992,93,94 Miquel van Smoorenburg .\" 1998-2002 Jukka Lahtinen .\" It may be distributed under the GNU Public License, version 2, or .\" any higher version. See section COPYIN
www.eeworm.com/read/274401/10873539

scf 显示桌面.scf

[Shell] Command=2 IconFile=explorer.exe,3 [Taskbar] Command=ToggleDesktop
www.eeworm.com/read/418905/10892074

cmd p&e_multilink_cyclonepro_erase_unsecure_hcs12.cmd

// ver 1.1 (7/7/04) // HCS12X Core erasing + unsecuring command file: // These commands mass erase the chip then program the security byte to 0xFE (unsecured state). // Evaluate the clock divider
www.eeworm.com/read/418779/10897599

txt 1333.txt

Rule: -- Sid: 1333 -- Summary: Attempted id command access via web -- Impact: Attempt to gain information on users and groups that exist on the host using the id command. -- Detailed Information:
www.eeworm.com/read/418779/10897996

txt 1734.txt

Rule: -- Sid: 1734 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow or denial of service vulnerability associated with FTP USER command. -- Impact: Remote a
www.eeworm.com/read/418779/10898360

txt 1353.txt

Rule: -- Sid: 1353 -- Summary: Attempted nasm command access via web. -- Impact: Attempt to compile a binary on a host. -- Detailed Information: This is an attempt to compiile a program source on
www.eeworm.com/read/418779/10898657

txt 2105.txt

Rule: -- Sid: 2105 -- Summary: This event is generated when a remote user uses the IMAP AUTHENTICATE command to send a suspiciously long string to port 143 on an internal server. This may indicate a
www.eeworm.com/read/418779/10899355

txt 4144.txt

Rule: -- Sid: 4144 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Solaris Line Printer Daemon (LPD). -- Impact: Serious. Unauthorized removal of fil