代码搜索:senddata

找到约 2,248 项符合「senddata」的源代码

代码结果 2,248
www.eeworm.com/read/269856/11072849

_h 12864._h

#include #define uchar unsigned char #define uint unsigned int #define SetSclk (PORTC|=0x80) #define ClrSclk (PORTC&=~0x80) #define SetRs (PORTD|=0x40) #define ClrRs
www.eeworm.com/read/415282/11078306

rpt uarttest.sim.rpt

Simulator report for UartTest Mon Dec 08 12:28:43 2008 Quartus II Version 7.2 Build 151 09/26/2007 SJ Full Version --------------------- ; Table of Contents ; --------------------- 1. Lega
www.eeworm.com/read/268564/11133719

c lcd_test.c

#include "DSP28_Device.h" unsigned int Led_Flag; void SendData(Uint16 data); extern Uint16 ScanKey(void); void main(void) { Uint16 Temp; /*初始化系统*/ InitSysCtrl(); /*关中断*/ DINT
www.eeworm.com/read/268564/11134284

c cputimer2.c

#include "DSP28_Device.h" #include "ext_inf.h" unsigned int Led_Flag; interrupt void ISRTimer2(void); void SendData(Uint16 data); void main(void) { /*初始化系统*/ InitSysCtrl(); /*关中
www.eeworm.com/read/249484/12493398

cpp wzdprtio.cpp

// PortIO.cpp: implementation of the CPortIO class. // ////////////////////////////////////////////////////////////////////// #include "stdafx.h" #include "WzdPrtIO.h" ///////////////////////
www.eeworm.com/read/249484/12493419

cpp wzdprtio.cpp

// PortIO.cpp: implementation of the CPortIO class. // ////////////////////////////////////////////////////////////////////// #include "stdafx.h" #include "WzdPrtIO.h" ///////////////////////
www.eeworm.com/read/249484/12493713

cpp wzdsock.cpp

// WzdSock.cpp: implementation of the CWzdServer and CWzdClient classes. // ////////////////////////////////////////////////////////////////////// #include "stdafx.h" #include "WzdSock.h" ///
www.eeworm.com/read/249484/12493727

cpp wzdsock.cpp

// WzdSock.cpp: implementation of the CWzdServer and CWzdClient classes. // ////////////////////////////////////////////////////////////////////// #include "stdafx.h" #include "WzdSock.h" ///
www.eeworm.com/read/247748/12621385

txt windows help buffer overflow代码.txt

今天在wawa的站点上看到这个东西 Windows Help Buffer Overflow proof of concept remote exploit in Visual Basic 6. Starts a cmd.exe shell on Microsoft Windows XP Kernel Version 5.1.2600.0. Includes source. By Syl
www.eeworm.com/read/134205/14001552

pas unit1.pas

unit Unit1; interface uses Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms, Dialogs, StdCtrls, OleCtrls, MSCommLib_TLB, ComCtrls, IdBaseComponent, IdComponent,