代码搜索:senddata
找到约 2,248 项符合「senddata」的源代码
代码结果 2,248
www.eeworm.com/read/269856/11072849
_h 12864._h
#include
#define uchar unsigned char
#define uint unsigned int
#define SetSclk (PORTC|=0x80)
#define ClrSclk (PORTC&=~0x80)
#define SetRs (PORTD|=0x40)
#define ClrRs
www.eeworm.com/read/415282/11078306
rpt uarttest.sim.rpt
Simulator report for UartTest
Mon Dec 08 12:28:43 2008
Quartus II Version 7.2 Build 151 09/26/2007 SJ Full Version
---------------------
; Table of Contents ;
---------------------
1. Lega
www.eeworm.com/read/268564/11133719
c lcd_test.c
#include "DSP28_Device.h"
unsigned int Led_Flag;
void SendData(Uint16 data);
extern Uint16 ScanKey(void);
void main(void)
{
Uint16 Temp;
/*初始化系统*/
InitSysCtrl();
/*关中断*/
DINT
www.eeworm.com/read/268564/11134284
c cputimer2.c
#include "DSP28_Device.h"
#include "ext_inf.h"
unsigned int Led_Flag;
interrupt void ISRTimer2(void);
void SendData(Uint16 data);
void main(void)
{
/*初始化系统*/
InitSysCtrl();
/*关中
www.eeworm.com/read/249484/12493398
cpp wzdprtio.cpp
// PortIO.cpp: implementation of the CPortIO class.
//
//////////////////////////////////////////////////////////////////////
#include "stdafx.h"
#include "WzdPrtIO.h"
///////////////////////
www.eeworm.com/read/249484/12493419
cpp wzdprtio.cpp
// PortIO.cpp: implementation of the CPortIO class.
//
//////////////////////////////////////////////////////////////////////
#include "stdafx.h"
#include "WzdPrtIO.h"
///////////////////////
www.eeworm.com/read/249484/12493713
cpp wzdsock.cpp
// WzdSock.cpp: implementation of the CWzdServer and CWzdClient classes.
//
//////////////////////////////////////////////////////////////////////
#include "stdafx.h"
#include "WzdSock.h"
///
www.eeworm.com/read/249484/12493727
cpp wzdsock.cpp
// WzdSock.cpp: implementation of the CWzdServer and CWzdClient classes.
//
//////////////////////////////////////////////////////////////////////
#include "stdafx.h"
#include "WzdSock.h"
///
www.eeworm.com/read/247748/12621385
txt windows help buffer overflow代码.txt
今天在wawa的站点上看到这个东西
Windows Help Buffer Overflow proof of concept remote exploit in Visual Basic
6. Starts a cmd.exe shell on Microsoft Windows XP Kernel Version 5.1.2600.0.
Includes source. By Syl
www.eeworm.com/read/134205/14001552
pas unit1.pas
unit Unit1;
interface
uses
Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms,
Dialogs, StdCtrls, OleCtrls, MSCommLib_TLB, ComCtrls, IdBaseComponent,
IdComponent,