代码搜索:sequence

找到约 10,000 项符合「sequence」的源代码

代码结果 10,000
www.eeworm.com/read/247748/12621652

txt sql server 2000 sp2 12命令的溢出攻击实现.txt

自上次被isno指教了一翻,这几天开始用汇编看sql server的代码,发现SQL SERVER的1433 TDS协议中,0X12号命令(请求验证)存在一个溢出问题,在传送最后的MSSQLSERVER后面跟上572个以上的字节会导致溢出,心里一喜,但吸取上次教训,一查,发现8月12这个漏洞已经被公告。哎 但是一看,公告代码只指出溢出,但是未实现溢出,仔细一看,要实现这个溢出还是很麻烦的,涉及到 ...
www.eeworm.com/read/146632/12629956

h transaction.h

// Transaction.h: interface for the Transaction class. // ////////////////////////////////////////////////////////////////////// #if !defined(AFX_TRANSACTION_H__F1B9619F_A02A_4D38_BC22_17A83C57BB
www.eeworm.com/read/247673/12632687

c alg38.c

#include #include #include /* generates: original element sequence: 0 1 1 2 3 5 8 13 21 34 sequence after applying remove_if < 10: 13 21 34
www.eeworm.com/read/247673/12632712

c alg36.c

#include #include #include int main() { vector< int, allocator > vec; for ( int ix = 0; ix < 20; ix++ ) vec.push_back( ix ); random_shuffle(
www.eeworm.com/read/247673/12632828

c alg49.c

#include #include #include /* generates: original element sequence of first container: 0 1 2 3 4 5 6 7 8 9 original element sequence of second cont
www.eeworm.com/read/238454/13886099

htm que_176.htm

Ocp test
www.eeworm.com/read/135898/13888636

c alg38.c

#include #include #include /* generates: original element sequence: 0 1 1 2 3 5 8 13 21 34 sequence after applying remove_if < 10: 13 21 34
www.eeworm.com/read/135898/13888647

c alg36.c

#include #include #include int main() { vector< int, allocator > vec; for ( int ix = 0; ix < 20; ix++ ) vec.push_back( ix ); random_shuffle(
www.eeworm.com/read/135898/13888721

c alg49.c

#include #include #include /* generates: original element sequence of first container: 0 1 2 3 4 5 6 7 8 9 original element sequence of second cont
www.eeworm.com/read/238267/13898617

m gray2bi.m

function b = gray2bi( g ) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %% % %% GRAY2BI converts Gray encoded se