代码搜索:executables

找到约 1,287 项符合「executables」的源代码

代码结果 1,287
www.eeworm.com/read/270032/11050790

makefile

# # Makefile for Graphics Gems source # # Craig Kolb, 8/90 # # This make file will build "gemslib.a" and a number of executables. # Gemslib is built solely for debugging purposes -- it is not intended
www.eeworm.com/read/386806/8726083

c binfmt_coff.c

/* * These are the functions used to load COFF IBSC style executables. * Information on COFF format may be obtained in either the Intel Binary * Compatibility Specification 2 or O'Rilley's book
www.eeworm.com/read/383713/8925554

c binfmt_coff.c

/* * These are the functions used to load COFF IBSC style executables. * Information on COFF format may be obtained in either the Intel Binary * Compatibility Specification 2 or O'Rilley's book
www.eeworm.com/read/379711/9182147

c binfmt_coff.c

/* * These are the functions used to load COFF IBSC style executables. * Information on COFF format may be obtained in either the Intel Binary * Compatibility Specification 2 or O'Rilley's book
www.eeworm.com/read/374163/9419085

pl chkdupexe.pl

#!/usr/bin/perl -w # # chkdupexe version 2.1.1 # # Simple script to look for and list duplicate executables and dangling # symlinks in the system executable directories. # # Copyright 1993 Nicolai Lan
www.eeworm.com/read/169457/9860136

components

Okay, these are my ideas so far on components and interfaces in COS Firstly, code will be separated into 2 types of executables/libraries. We will have "flat" binaries and "component" binaries, both
www.eeworm.com/read/163079/10176383

c binfmt_coff.c

/* * These are the functions used to load COFF IBSC style executables. * Information on COFF format may be obtained in either the Intel Binary * Compatibility Specification 2 or O'Rilley's book
www.eeworm.com/read/352754/10517358

c binfmt_coff.c

/* * These are the functions used to load COFF IBSC style executables. * Information on COFF format may be obtained in either the Intel Binary * Compatibility Specification 2 or O'Rilley's book
www.eeworm.com/read/276954/10692325

txt readme.txt

The sources for the sample programs are stored in the src directory: src/kmlminimal.cpp Minimal sample program src/kmlsample.cpp A more interesting sample program The executables are compile
www.eeworm.com/read/444676/7608702

asm danger.asm

;This program is a virus that infects all files, not just executables. It gets ;the first five bytes of its host and stores them elsewhere in the program and ;puts a jump to it at the start, along w