代码搜索:ability
找到约 977 项符合「ability」的源代码
代码结果 977
www.eeworm.com/read/424063/10499709
m diskdemo.m
%DISKDEMO.M Demonstration design of harddisk digital controller.
echo on
% This file demonstrates MATLAB's ability for classical digital control
% system design by going through the design of a c
www.eeworm.com/read/424063/10499874
m jetdemo.m
echo on
% This file demonstrates MATLAB's ability for classical control system
% design by going through the design of a YAW DAMPER for a Jet Transport
% aircraft.
echo off
% Copyright (c) 19
www.eeworm.com/read/278099/10572438
c stub.c
/* +++Date last modified: 05-Jul-1997 */
/*
** STUB.C - Utility to truncate files
**
** STUB is used with MAKE utilities which lack the ability to timestamp
** library object modules
www.eeworm.com/read/418779/10898495
txt 335.txt
Rule:
--
Sid:
335
--
Summary:
This event is generated when an attempt to copy a specific file to an FTP server is made.
--
Impact:
Serious. An attacker might gain the ability to remotely conn
www.eeworm.com/read/418779/10899138
txt 1886.txt
Rule:
--
Sid:
1886
--
Summary:
This rule has been placed in deleted.rules
--
Impact:
attacker might have gained an ability to execute commands remotely on the system.
--
Detailed Informati
www.eeworm.com/read/418779/10899698
txt 334.txt
Rule:
--
Sid:
334
--
Summary:
This event is generated when an attempt to copy a specific file to an FTP server is made.
--
Impact:
Serious. The attacker might gain the ability to execute com
www.eeworm.com/read/418779/10903010
txt 110.txt
Rule:
--
Sid:
110
--
Summary:
Netbus is a Trojan Horse.
--
Impact:
Possible theft of data and control of the targeted machine. This Trojan also has the ability to scan machines and networks for ope
www.eeworm.com/read/418779/10904238
txt 1883.txt
Rule:
--
Sid:
1883
--
Summary:
This rule has been placed in deleted.rules
--
Impact:
attacker might have gained an ability to execute commands remotely on the system.
--
Detailed Informatio
www.eeworm.com/read/418779/10906604
txt 109.txt
Rule:
--
Sid:
109
--
Summary:
Netbus is a Trojan Horse.
--
Impact:
Possible theft of data and control of the targeted machine. This Trojan also has the ability to scan machines and networks for ope
www.eeworm.com/read/418779/10909684
txt 1292.txt
Rule:
--
Sid:
1292
--
Summary:
This may be post-compromise behavior indicating the use of Windows directory listing tools.
--
Impact:
Varies, an attacker might have gained an ability to execute