代码搜索:Scripts

找到约 7,993 项符合「Scripts」的源代码

代码结果 7,993
www.eeworm.com/read/119738/14823285

cpp cppmain0.cpp

//This sample main program may be used to test C++ code generation scripts. //In With Class load cppcar.omt. Run the scripts cpphead.sct and cppfunc.sct //or borland scripts. //Create a project in
www.eeworm.com/read/219532/14876818

cpp jsinterpreting.cpp

// JSInterpreting.cpp : Defines the entry point for the console application. // // -------------------------------------------------------- // A Practical Guide to Script-Driven Software Developmen
www.eeworm.com/read/207238/15278243

txt readme.txt

IMPORTANT!!! ------------ You cannot use the CGI or DLL compiled with Personal or Single-USer Edition of Absolute Database, as the database file is accessed in multi-user mode and the nag-s
www.eeworm.com/read/169681/5415673

readme

This directory includes a set of scripts which will add event points to the network stack for use with the WindView visualization tool. Each script is executed from the Tornado Shell. Executing t
www.eeworm.com/read/167185/5462969

install

#! /bin/sh # # Install the section 5 manual pages # if test x$MANDIR = x then echo MANDIR macro not defined, check install scripts or seek help exit 1 fi if test ! -d $MANDIR then echo $MAND
www.eeworm.com/read/167185/5463143

install

#! /bin/sh # # This material contains proprietary software of Entropic Speech, Inc. # Any reproduction, distribution, or publication without the prior # written permission of Entropic Speech
www.eeworm.com/read/167185/5464776

erase_dist

#!/bin/sh echo "!!!!! This program erases the current distribution !!!!!" echo -n " Do you want to continue? [n] " read ans if [ ! "$ans" = "y" ] ; then echo "Aborting" fi ec
www.eeworm.com/read/161121/5559243

h sym_hipd.h

/* * Device driver for the SYMBIOS/LSILOGIC 53C8XX and 53C1010 family * of PCI-SCSI IO processors. * * Copyright (C) 1999-2001 Gerard Roudier * * This driver is derived from
www.eeworm.com/read/473927/6822883

txt 2077.txt

Rule: -- Sid: 2077 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Momabo Site Server. -- Impact: Unauthorized upload of files to a server. -- Deta