代码搜索:coded
找到约 2,797 项符合「coded」的源代码
代码结果 2,797
www.eeworm.com/read/406786/11435669
h config.h
#ifndef _CONFIG_H
#define _CONFIG_H
/*
* The root-device is no longer hard-coded. You can change the default
* root-device by changing the line ROOT_DEV = XXX in boot/bootsect.s
*/
/*
* define y
www.eeworm.com/read/261050/11668052
h filetransfer.h
/*coded by Andrew Downing*/
#include
#include
#pragma comment(lib, "ws2_32.lib")
#include
/*//////////Globals*/
static const int WAIT_CALL = 10;
t
www.eeworm.com/read/261050/11668064
h filetransfer.h
/*coded by Andrew Downing*/
#include
#include
#pragma comment(lib, "ws2_32.lib")
#include
/*//////////Globals*/
static const int WAIT_CALL = 10;
t
www.eeworm.com/read/156735/11780563
h config.h
#ifndef _CONFIG_H
#define _CONFIG_H
/*
* The root-device is no longer hard-coded. You can change the default
* root-device by changing the line ROOT_DEV = XXX in boot/bootsect.s
*/
/*
* define y
www.eeworm.com/read/259396/11795836
pl sha1-586.pl
#!/usr/local/bin/perl
# It was noted that Intel IA-32 C compiler generates code which
# performs ~30% *faster* on P4 CPU than original *hand-coded*
# SHA1 assembler implementation. To address this pr
www.eeworm.com/read/155568/11863048
m crypto.m
function y = crypto97(x)
% CRYPTO97 Cryptography example.
% y = crypto(x) converts an ASCII text string into another, coded string.
% The function is its own inverse, so crypto(crypto(x)) gives x b
www.eeworm.com/read/151555/12201529
m crypto.m
function y = crypto97(x)
% CRYPTO97 Cryptography example.
% y = crypto(x) converts an ASCII text string into another, coded string.
% The function is its own inverse, so crypto(crypto(x)) gives x b
www.eeworm.com/read/253602/12210272
txt emule 0.42e remote denial of service exploit.txt
#!/usr/bin/perl
system("cls");
# Emule 0.42e Remote Denial Of Service Exploit
# Coded by Rafel Ivgi, The-Insider
# usage: perl emule042e.pl
use IO::Socket;
my
www.eeworm.com/read/253602/12210523
txt netterm netftpd remote user authentication buffer overflow exploit.txt
#
# Net-ftpd 4.2.2 user autentication b0f exploit (0day)
# coded by Sergio 'shadown' Alvarez
#
import struct
import socket
import sys
import time
class warftpd:
def __init__(self, host, p
www.eeworm.com/read/337834/12338760
h accordion.h
#ifndef _ACCORDIONROUTE_H_
#define _ACCORDIONROUTE_H_
#include
#include
#include "chord_impl.h"
#include "route_recchord.h"
//jy: this is all hard coded now
#de