代码搜索:computers
找到约 1,033 项符合「computers」的源代码
代码结果 1,033
www.eeworm.com/read/337546/3335946
kconfig
#
# Appletalk driver configuration
#
config ATALK
tristate "Appletalk protocol support"
select LLC
---help---
AppleTalk is the protocol that Apple computers can use to communicate
on a networ
www.eeworm.com/read/324920/3494769
kconfig
#
# Appletalk driver configuration
#
config ATALK
tristate "Appletalk protocol support"
select LLC
---help---
AppleTalk is the protocol that Apple computers can use to communicate
on a networ
www.eeworm.com/read/316872/3594990
kconfig
#
# Appletalk driver configuration
#
config ATALK
tristate "Appletalk protocol support"
select LLC
---help---
AppleTalk is the protocol that Apple computers can use to communicate
on a networ
www.eeworm.com/read/443386/1747143
kconfig
#
# Appletalk driver configuration
#
config DEV_APPLETALK
bool "Appletalk interfaces support"
depends on ATALK
help
AppleTalk is the protocol that Apple computers can use to communicate
on a
www.eeworm.com/read/393286/2482251
kconfig
#
# Appletalk driver configuration
#
config ATALK
tristate "Appletalk protocol support"
select LLC
---help---
AppleTalk is the protocol that Apple computers can use to communicate
on a networ
www.eeworm.com/read/161121/5557960
c prom.c
/*
* BK Id: %F% %I% %G% %U% %#%
*/
/*
* Procedures for interfacing to the Open Firmware PROM on
* Power Macintosh computers.
*
* In particular, we are interested in the device tree
* and in usi
www.eeworm.com/read/159715/5582061
h vmeintr.h
/**
* @file rtems/vmeintr.h
*
* This file is the specification for the VMEbus interface library
* which should be provided by all BSPs for VMEbus Single Board
* Computers but currently only a
www.eeworm.com/read/415537/11063842
txt the constitution in cyberspace.txt
Laurence H. Tribe, "The Constitution in Cyberspace"
PREPARED REMARKS
KEYNOTE ADDRESS AT THE
FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY
Copyright, 1991, Jim Warren & Computer Professionals for
www.eeworm.com/read/415537/11064102
txt backdoors.txt
Backdoors
By Puerto
Since the early days of intruders breaking into computers, they have tried
to develop techniques or backdoors that allow them to get back into the
system. In this paper, it wi
www.eeworm.com/read/184955/9063770
doc readme.doc
"README.DOC" File
Release Notes for MICROSOFT(R) QuickBASIC Version 4.5 for
IBM(R) Personal Computers and Compatibles
(C) Copyright Microsoft Corporation, 1988
THIS F