代码搜索:Protected

找到约 10,000 项符合「Protected」的源代码

代码结果 10,000
www.eeworm.com/read/418779/10923695

txt 12436.txt

Rule: -- Sid: 12436 -- Summary: This event is generated when network traffic that indicates a Youtube video player file request has been made. -- Impact: Possible policy violation. The use of Youtu
www.eeworm.com/read/418779/10924302

txt 12031.txt

Rule: -- Sid: 12031 -- Summary: This event is generated when network traffic that indicates MSN is being used. -- Impact: Possible policy violation. The use of MSN may be prohibited by corporate po
www.eeworm.com/read/418779/10925483

txt 542.txt

Rule: -- Sid: 542 -- Summary: This event is generated when activity relating to network chat clients is detected. -- Impact: Policy Violation. Use of chat clients to communicate with unkown externa
www.eeworm.com/read/418779/10925827

txt 6182.txt

Rule: -- Sid: 6182 -- Summary: This event is generated when activity relating to network chat clients is detected. -- Impact: Policy Violation. Use of chat clients to communicate with unkown extern
www.eeworm.com/read/418779/10926105

txt 12032.txt

Rule: -- Sid: 12032 -- Summary: This event is generated when network traffic that indicates MSN is being used. -- Impact: Possible policy violation. The use of MSN may be prohibited by corporate po
www.eeworm.com/read/460852/7239375

java jpeerserverthreads.java

/** * * Program : JPeerServerThreads.java * * Author : Vijayakrishnan Menon * * Date : 26th Dec 2005 Updated on 25th Feb 2006 * * Organization : Centre f
www.eeworm.com/read/436760/7762895

inc dallas.inc

;**************************************************************************** ;* ;* Copyright (C) 2003 Dallas Semiconductor Corporation. ;* All rights Reserved. Printed in U.S.A. ;* This software
www.eeworm.com/read/397854/8019114

txt readme.txt

This folder contains functions for reading and writing the EEPROM connected to the nRF24E1 or nRF9E5. To try out the test program program your eval board with one of the precompiled hex-files, co
www.eeworm.com/read/142830/12916219

txt output.txt

Beginning test..... AMD Flash found in socket... Polling part for Device ID...found an Am29LV160B Checking current flash status...flash is [Ready] CFI Query String Read = [QRY] Primary table address
www.eeworm.com/read/326864/13112574

java 3dtext.java

import java.applet.Applet; import java.awt.AWTEvent; import java.awt.BorderLayout; import java.awt.CheckboxMenuItem; import java.awt.Component; import java.awt.Cursor; import java.awt.Font; imp