代码搜索:sequence
找到约 10,000 项符合「sequence」的源代码
代码结果 10,000
www.eeworm.com/read/247748/12621652
txt sql server 2000 sp2 12命令的溢出攻击实现.txt
自上次被isno指教了一翻,这几天开始用汇编看sql server的代码,发现SQL SERVER的1433 TDS协议中,0X12号命令(请求验证)存在一个溢出问题,在传送最后的MSSQLSERVER后面跟上572个以上的字节会导致溢出,心里一喜,但吸取上次教训,一查,发现8月12这个漏洞已经被公告。哎
但是一看,公告代码只指出溢出,但是未实现溢出,仔细一看,要实现这个溢出还是很麻烦的,涉及到 ...
www.eeworm.com/read/146632/12629956
h transaction.h
// Transaction.h: interface for the Transaction class.
//
//////////////////////////////////////////////////////////////////////
#if !defined(AFX_TRANSACTION_H__F1B9619F_A02A_4D38_BC22_17A83C57BB
www.eeworm.com/read/247673/12632687
c alg38.c
#include
#include
#include
/* generates:
original element sequence:
0 1 1 2 3 5 8 13 21 34
sequence after applying remove_if < 10:
13 21 34
www.eeworm.com/read/247673/12632712
c alg36.c
#include
#include
#include
int main()
{
vector< int, allocator > vec;
for ( int ix = 0; ix < 20; ix++ )
vec.push_back( ix );
random_shuffle(
www.eeworm.com/read/247673/12632828
c alg49.c
#include
#include
#include
/* generates:
original element sequence of first container:
0 1 2 3 4 5 6 7 8 9
original element sequence of second cont
www.eeworm.com/read/135898/13888636
c alg38.c
#include
#include
#include
/* generates:
original element sequence:
0 1 1 2 3 5 8 13 21 34
sequence after applying remove_if < 10:
13 21 34
www.eeworm.com/read/135898/13888647
c alg36.c
#include
#include
#include
int main()
{
vector< int, allocator > vec;
for ( int ix = 0; ix < 20; ix++ )
vec.push_back( ix );
random_shuffle(
www.eeworm.com/read/135898/13888721
c alg49.c
#include
#include
#include
/* generates:
original element sequence of first container:
0 1 2 3 4 5 6 7 8 9
original element sequence of second cont
www.eeworm.com/read/238267/13898617
m gray2bi.m
function b = gray2bi( g )
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %
%% GRAY2BI converts Gray encoded se