代码搜索:computers

找到约 1,033 项符合「computers」的源代码

代码结果 1,033
www.eeworm.com/read/337546/3335946

kconfig

# # Appletalk driver configuration # config ATALK tristate "Appletalk protocol support" select LLC ---help--- AppleTalk is the protocol that Apple computers can use to communicate on a networ
www.eeworm.com/read/324920/3494769

kconfig

# # Appletalk driver configuration # config ATALK tristate "Appletalk protocol support" select LLC ---help--- AppleTalk is the protocol that Apple computers can use to communicate on a networ
www.eeworm.com/read/316872/3594990

kconfig

# # Appletalk driver configuration # config ATALK tristate "Appletalk protocol support" select LLC ---help--- AppleTalk is the protocol that Apple computers can use to communicate on a networ
www.eeworm.com/read/443386/1747143

kconfig

# # Appletalk driver configuration # config DEV_APPLETALK bool "Appletalk interfaces support" depends on ATALK help AppleTalk is the protocol that Apple computers can use to communicate on a
www.eeworm.com/read/393286/2482251

kconfig

# # Appletalk driver configuration # config ATALK tristate "Appletalk protocol support" select LLC ---help--- AppleTalk is the protocol that Apple computers can use to communicate on a networ
www.eeworm.com/read/161121/5557960

c prom.c

/* * BK Id: %F% %I% %G% %U% %#% */ /* * Procedures for interfacing to the Open Firmware PROM on * Power Macintosh computers. * * In particular, we are interested in the device tree * and in usi
www.eeworm.com/read/159715/5582061

h vmeintr.h

/** * @file rtems/vmeintr.h * * This file is the specification for the VMEbus interface library * which should be provided by all BSPs for VMEbus Single Board * Computers but currently only a
www.eeworm.com/read/415537/11063842

txt the constitution in cyberspace.txt

Laurence H. Tribe, "The Constitution in Cyberspace" PREPARED REMARKS KEYNOTE ADDRESS AT THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY Copyright, 1991, Jim Warren & Computer Professionals for
www.eeworm.com/read/415537/11064102

txt backdoors.txt

Backdoors By Puerto Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this paper, it wi
www.eeworm.com/read/184955/9063770

doc readme.doc

"README.DOC" File Release Notes for MICROSOFT(R) QuickBASIC Version 4.5 for IBM(R) Personal Computers and Compatibles (C) Copyright Microsoft Corporation, 1988 THIS F