Demo Name: Main Author: Ted Rybicki Purpose: Sync up systems and workstations clock through firewalls with socks support. NOTE: You will need to set Name field in IdSocksInfo1 to your socks server for socks support to work correctly. History: Date: 27/10/2002 01:49:13 Checked with Indy version: 9.0 ---------------------------------------------------------------------------- Notes: Demonstrates a DateTime client getting current date and time from remote DateTimeServer A list of time servers is available at: http://www.eecis.udel.edu/~mills/ntp/servers.html
标签: workstations Rybicki Purpose systems
上传时间: 2013-12-27
上传用户:helmos
修改后的PHPExcelParser4。 修改内容: 1,原来sample取出excel时是使用的Unicode编码。导致插入mysql时也写入unicode 现在把Unicod编码转换成GBK后再在网页上显示及写入数据库.此部分修改的是U2html这个function。 2,打 开数据库连接后增加 set Names gbk 3,默认选中把excel的第一列作为字段名 4,默认不选中如果存在表则删除选项 5,原来对表名及字段名有过滤掉一些字符如"-",现在则取消了这个过滤,我觉得在excel第一列或在操作过程中由人工确定更合适。
标签: PHPExcelParser4 修改
上传时间: 2017-07-09
上传用户:whenfly
RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。 RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。RSA的安全性依赖于大数的因子分解,但并没有从理论上证明破译RSA的难度与大数分解难度等价。即RSA的重大缺陷是无法从理论上把握它的保密性能如何,而且密码学界多数人士倾向于因子分解不是NPC问题。RSA的缺点主要有:A)产生密钥很麻烦,受到素数产生技术的限制,因而难以做到一次一密。B)分组长度太大,为保证安全性,n 至少也要 600 bits以上,使运算代价很高,尤其是速度较慢,较对称密码算法慢几个数量级;且随着大数分解技术的发展,这个长度还在增加,不利于数据格式的标准化。目前,SET(Secure Electronic Transaction)协议中要求CA采用2048比特长的密钥,其他实体使用1024比特的密钥。 这种算法1978年就出现了,它是第一个既能用于数据加密也能用于数字签名的算法。它易于理解和操作,也很流行。算法的名字以发明者的名字命名:Ron Rivest, AdiShamir 和Leonard Adleman。但RSA的安全性一直未能得到理论上的证明。
上传时间: 2014-01-20
上传用户:蠢蠢66
JavaServer Faces (JSF) is the “offcial” component-based view technology in the Java EE web tier. JSF includes a set of predefned UI components, an event-driven programming model, and the ability to add third-party components. JSF is designed to be extensible, easy to use, and toolable. This refcard describes the JSF development process, standard JSF tags, the JSF expression language, and the faces-confg.xml confguration fle.
标签: component-based JavaServer technology the
上传时间: 2014-01-12
上传用户:songyue1991
Eclipse is the leading Integrated Development Environment (IDE) for Java, with a rich ecosystem of plug-ins and an open source framework that supports other languages and projects. You’ll fnd this reference card useful for getting started with Eclipse and exploring the breadth of its features. We rundown the Eclipse distributions and confguration options, then guide you through Views, Editors, and Perspec- tives in Workbench 101. We list the top shortcuts and toolbar actions for everyday development. And, we provide a guide to the best places for fnding plug-ins and getting involved with the Eclipse community.
标签: Development Environment Integrated ecosystem
上传时间: 2013-12-18
上传用户:wangchong
Unix服务器监控的实例脚本,获取服务器的Top信息
上传时间: 2013-12-09
上传用户:zhyiroy
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
标签: keys Aircrack-ng cracking WPA-PSK
上传时间: 2013-12-25
上传用户:bruce
Run following Matlab commands to make sure the installation worked correctly. Unlike query function, filterdb does not load all waveforms to memory but returns filtered database object. This is useful when the resulting set of the query is too big to fit in memory. Consequent calls to read function can be made to read content of this filtered database object.
标签: installation following correctly commands
上传时间: 2013-12-30
上传用户:ainimao
The sample provided here is a simple control panel application that will just display the memory usage of the system using a message box. Windows Mobile
标签: application provided control display
上传时间: 2014-01-25
上传用户:xwd2010
This m file hide an image jpeg,png in another jpeg,png image. The height and width of the secret image is in LSB of 1st 32 pixels of 1st row of the cover image.This helps in the recovery of secret image. The secret image must be smaller than cover image.A message box will appear with a number ,that number is the maximum product of width and height of secret image that can be successfully embedded in the cover image. The final png image will appear in workspace with random name.This image contains the secret image.One such png image is in the zip file with name 4447.png it contains an image of res 100x122.
上传时间: 2017-07-25
上传用户:gououo