代码搜索:folder
找到约 10,000 项符合「folder」的源代码
代码结果 10,000
www.eeworm.com/read/285520/8834021
cpp driveview.cpp
// DriveTreeView.cpp : implementation of the CDriveView class
//
#include "stdafx.h"
#include "DriveTree.h"
#include "DriveTreeDoc.h"
#include "DriveView.h"
#ifdef _DEBUG
#define new DEBU
www.eeworm.com/read/428131/8892412
cpp driveview.cpp
// DriveTreeView.cpp : implementation of the CDriveView class
//
#include "stdafx.h"
#include "Wanderer.h"
#include "WandererDoc.h"
#include "DriveView.h"
#ifdef _DEBUG
#define new DEBUG_
www.eeworm.com/read/428131/8892946
cpp driveview.cpp
// DriveTreeView.cpp : implementation of the CDriveView class
//
#include "stdafx.h"
#include "DriveTree.h"
#include "DriveTreeDoc.h"
#include "DriveView.h"
#ifdef _DEBUG
#define new DEBU
www.eeworm.com/read/382802/8999823
txt vbs脚本病毒”获得控制权的典型方法.txt
VBS脚本病毒”获得控制权的典型方法
如何获取控制权?这一个是一个比较有趣的话题,而VBS脚本病毒似乎将这个话题发挥的淋漓尽致。在这里列出几种典型的方法:
一、修改注册表项
windows在启动的时候,会自动加载HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run项下的各键值所执向的程 ...
www.eeworm.com/read/184964/9062998
ini desktop.ini
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=file://Folder Settings\Folder.htt
PersistMonikerPreview=%WebDir%\classic.bmp
[ExtShellFolderViews]
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5
www.eeworm.com/read/381431/9093151
mcs pic18f4580_can_rs232_picc8.35.mcs
[Header]
MagicCookie={0b13fe8c-dfe0-40eb-8900-6712719559a7}
Version=1.0
[File000]
Location=E:\PIC\DIY\CAN Simple Board_PIC18F4X8X\Program of PIC18F4580\Program of PICC8.35\PIC18F4580_CAN_RS232_PIC
www.eeworm.com/read/375212/9369120
m readme.m
echo on
% README Release notes for PLS_Toolbox 1.5.1
% October 22, 1995
%
% To install the PLS_Toolbox simply copy the PLS_Tool
% directory (or PLS_Toolbox folder on Macintosh systems)
% to you
www.eeworm.com/read/363700/9939874
mcs s6b0724.mcs
[Header]
MagicCookie={0b13fe8c-dfe0-40eb-8900-6712719559a7}
Version=1.0
[File000]
Location=main.ERR
Folder=Intermediary
[File001]
Location=D:\work\My Private Documents\LCD(S6B0724)\main.o
Fold