This worm file is disseminated except that through MIRC and outlook Express. This worm will duplicate red.exe in the computer arriving and infecting too, and in mirc catalogue in the system, produce a script.ini file, let the worm be disseminated through Mirc communication software by this.
标签: This worm disseminated duplicat
上传时间: 2017-01-13
上传用户:dbs012280
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such as Kernel Configuration, Networking, User Administration, and File Management are covered extensively for the administrator who wants a variety of options to choose from for best performance. The book also provides in-depth coverage of configuring and optimizing mail, DNS, HTTP and other services many companies deploy across their intranet and on the Internet
标签: administrator Unleashed Edition written
上传时间: 2017-01-13
上传用户:来茴
The W3C DOM Core interfaces defines a minimal set of: A. interfaces for accessing and manipulating document objects B. Java object implementations for use with XML parsers. C. Conventions and processes for creating live HTML pages. D. Mutable document
标签: interfaces A. manipulating accessing
上传时间: 2017-01-24
上传用户:edisonfather
数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-setting" file, it assembles to the data abort veneer. This is described in detail in the documentation. The "dabort.h" file contains definitions of some constants used in the data abort veneer s interface to the rest of the system - again, this is described in the documentation. The "option.s" file is an example "options-setting" file.
标签: corresponding PreDefines options-s suitable
上传时间: 2013-12-03
上传用户:星仔
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789
This document describes the interface between HLA and Linux via direct system calls. The HLA Standard Library provides a header file with a set of important constants, data types, and procedure prototypes that you can use to make Linux system calls.
标签: HLA describes interface document
上传时间: 2013-12-24
上传用户:shus521
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
标签: different computer acquired sampling
上传时间: 2013-12-28
上传用户:来茴
These are matlab and simulink files to model the membrane crystallization system, including the matlab file to get the optimation point of this system, and 3 simulink files, which are static model and 2 dynamic models. There has PID control and feed forward control for the dynamic models.
标签: crystallization including the simulink
上传时间: 2017-04-13
上传用户:ljt101007
A Perl-based statistics management system designed for academic competition tournaments. These tournaments, which are called "College Bowl," "quiz bowl," and a variety of other names, involve teams playing against each other in either timed or untime The latest file releases
标签: competition tournaments Perl-based statistics
上传时间: 2017-05-10
上传用户:问题问题