代码搜索结果
找到约 10,000 项符合
State Machine 的代码
chapter 2 the components of a compiler.htm
Chapter 2: The Componen
209.txt
Rule:
--
Sid:
209
--
Summary:
w00w00 is a Trojan Horse utilizing Telnet. This event is generated when
an attacker attempts to connect to a w00w00 server using Telnet.
--
Impact:
Possible theft of
106.txt
Rule:
--
Sid:
106
--
Summary:
Backdoor.AckCmd is a Trojan Horse that uses TCP ACK segments to
communicate. This Trojan may bypass firewalls that do not keep track of
the session state in a TCP trans
arch.tcl
#
# Run this Tcl script to generate the sqlite.html file.
#
set rcsid {$Id: arch.tcl,v 1.16 2004/10/10 17:24:54 drh Exp $}
source common.tcl
header {Architecture of SQLite}
puts {
The Architecture
read me 1st.txt
The Genuine Enigma Machine
''''''''''''''''''''''''''
I took a few liberties with the appearance and the setup but the interior
mechanism and functioning are genuine. And there was no spacebar -
arch.tcl
#
# Run this Tcl script to generate the sqlite.html file.
#
set rcsid {$Id: arch.tcl,v 1.16 2004/10/10 17:24:54 drh Exp $}
source common.tcl
header {Architecture of SQLite}
puts {
The Architecture
rfc56.txt
Network Working Group Ed Belove (Harvard)
Request for Comments: 56 Dave Black (Harvard)
rfc56.txt
Network Working Group Ed Belove (Harvard)
Request for Comments: 56 Dave Black (Harvard)
rfc83.txt
Network Working Group R. Anderson
Request for Comments: 83 A. Harslem
NIC: 5621
rfc56.txt
Network Working Group Ed Belove (Harvard)
Request for Comments: 56 Dave Black (Harvard)