代码搜索:Tested

找到约 4,133 项符合「Tested」的源代码

代码结果 4,133
www.eeworm.com/read/465478/7055470

c nbtest.c

/* * nbtest.c: read and write in non-blocking mode * * Tested with 1.2 on the x86 * * Actually, it should run with any Unix */ #include #include #include #include
www.eeworm.com/read/456187/7355235

java exercise10_4.java

// Exercise10_4.java public class Exercise10_4 { public static void main(String[] args) { new Exercise10_4(); } public Exercise10_4() { // Define the arrays to be tested. St
www.eeworm.com/read/455809/7365370

c videodog44.c

/* videodog4.c - v4l capture using the double buffer capability */ /* experimental code */ /* tested only w/ cpia driver over paralel port */ #include #include #i
www.eeworm.com/read/455809/7365388

c~ videodog44.c~

/* videodog4.c - v4l capture using the double buffer capability */ /* experimental code */ /* tested only w/ cpia driver over paralel port */ #include #include #i
www.eeworm.com/read/448281/7535480

readme

# Alf It use "ptrace" system call to edit other process' memory. This program is highly OS and architecture specific. Now it is only tested under my i386 GNU/Linux. If
www.eeworm.com/read/440621/7685107

txt armadillo 4.xx oep finder.txt

/* Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92 NOTES: - Remove all hardware breakpoints before run the script. - Add the following custom exceptions on OllyDbg: C0000005(ACCESS
www.eeworm.com/read/440621/7685377

txt armadillo standard unpack + strategic code splicing.txt

/* .:TEAM RESURRECTiON:. Armadillo Standard+Strategic Code Splicing Script by AvAtAr Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92 NOTES: - Remove all hardware breakpoints before run t
www.eeworm.com/read/440621/7685421

txt arm_code_splicing_unpack.txt

/* .:TEAM RESURRECTiON:. Armadillo Standard+Strategic Code Splicing Script by AvAtAr Tested on WinXP Pro SP2, OllyDbg v1.10, OllyScript v0.92 NOTES: - Remove all hardware breakpoints before run t
www.eeworm.com/read/440621/7685609

txt pespin 0.3 - 1.0 stolen bytes & oep finder.txt

/* 10h24 PM Tuesday 11 January 2005 PESpin 0.3 - 1.0 Stolen Bytes and OEP Finder Tested with PESpin 0.3 & PESpin 1.0 with a some program , you must know use this script for fix IAT Author : dqtln
www.eeworm.com/read/435688/7787743

pl demo-fifo.pl

#!/usr/bin/perl -w # # Perl named pipe demo with the GTK-server # Tested with Perl 5.8 on Slackware Linux 9.1 # # August 2, 2004 by Peter van Eerten # Revised for GTK-server 1.2 October 7, 2004 # Revi