代码搜索:Tested
找到约 4,133 项符合「Tested」的源代码
代码结果 4,133
www.eeworm.com/read/465478/7055470
c nbtest.c
/*
* nbtest.c: read and write in non-blocking mode
*
* Tested with 1.2 on the x86
*
* Actually, it should run with any Unix
*/
#include
#include
#include
#include
www.eeworm.com/read/456187/7355235
java exercise10_4.java
// Exercise10_4.java
public class Exercise10_4 {
public static void main(String[] args) {
new Exercise10_4();
}
public Exercise10_4() {
// Define the arrays to be tested.
St
www.eeworm.com/read/455809/7365370
c videodog44.c
/* videodog4.c - v4l capture using the double buffer capability */
/* experimental code */
/* tested only w/ cpia driver over paralel port */
#include
#include
#i
www.eeworm.com/read/455809/7365388
c~ videodog44.c~
/* videodog4.c - v4l capture using the double buffer capability */
/* experimental code */
/* tested only w/ cpia driver over paralel port */
#include
#include
#i
www.eeworm.com/read/448281/7535480
readme
# Alf
It use "ptrace" system call to edit other process' memory.
This program is highly OS and architecture specific. Now it is only tested
under my i386 GNU/Linux. If
www.eeworm.com/read/440621/7685107
txt armadillo 4.xx oep finder.txt
/*
Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92
NOTES:
- Remove all hardware breakpoints before run the script.
- Add the following custom exceptions on OllyDbg:
C0000005(ACCESS
www.eeworm.com/read/440621/7685377
txt armadillo standard unpack + strategic code splicing.txt
/*
.:TEAM RESURRECTiON:.
Armadillo Standard+Strategic Code Splicing Script by AvAtAr
Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92
NOTES:
- Remove all hardware breakpoints before run t
www.eeworm.com/read/440621/7685421
txt arm_code_splicing_unpack.txt
/*
.:TEAM RESURRECTiON:.
Armadillo Standard+Strategic Code Splicing Script by AvAtAr
Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92
NOTES:
- Remove all hardware breakpoints before run t
www.eeworm.com/read/440621/7685609
txt pespin 0.3 - 1.0 stolen bytes & oep finder.txt
/*
10h24 PM Tuesday 11 January 2005
PESpin 0.3 - 1.0 Stolen Bytes and OEP Finder
Tested with PESpin 0.3 & PESpin 1.0
with a some program , you must know use this script for fix IAT
Author : dqtln
www.eeworm.com/read/435688/7787743
pl demo-fifo.pl
#!/usr/bin/perl -w
#
# Perl named pipe demo with the GTK-server
# Tested with Perl 5.8 on Slackware Linux 9.1
#
# August 2, 2004 by Peter van Eerten
# Revised for GTK-server 1.2 October 7, 2004
# Revi