Someone
共 38 篇文章
Someone 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 38 篇文章,持续更新中。
He was the first one (I noticed of) who coded a decrypter for yC 1.2 :)...good job. Also if it hasn
He was the first one (I noticed of) who coded a
decrypter for yC 1.2 :)...good job. Also if it hasn t
full support yet >:-)
So as I promised...here s the source code.
I hope it helps someone.
The Art of Assembly Language Amazing! You’re actually reading this. That puts you into one of three
The Art of Assembly Language Amazing! You’re actually reading this. That puts you into one of three categories: a student who is
being forced to read this stuff for a class, someone who picked up thi
ds1302 program.. good bless the person that will try it..... could someone help me?
ds1302 program.. good bless the person that will try it..... could someone help me?
ASK发送器接收器用作汽车防盗报警系统
<div>
Abstract: After you park your car and go into your house, probably the last thing that you want to think about is someone stealing
排队的MMS模型
排队的MMS模型, how could someone run (execute) your program and if it could be used for the M/M/1 model
This small utility helps to generate seven segment display codes for different I/O connections. For
This small utility helps to generate seven segment display codes for different I/O connections. For example, AVR/PIC
Port A.0 -> D Segment
Port A.1 -> B Segment ....
Also it can generate C
Full ARM920T S3C2443 ( Magellan Maestro 4245/4250 ) WinCE FileBackup of stored "Windows" path. Hope
Full ARM920T S3C2443 ( Magellan Maestro 4245/4250 ) WinCE FileBackup of stored "\Windows" path. Hope is for someone needfull. Sorry for my bad english... come from germany... greetings to all develop
Distributed applications, devices, and services appear in many different arrangements in an enterpr
Distributed applications, devices, and services appear in many different arrangements in an
enterprise. At your company, you probably access data from your intranet services, from
computers distribu
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives
this a SVM toolbox,it is very useful for someone who just learn SVM.In order to be undestood easily,
this a SVM toolbox,it is very useful for someone who just learn SVM.In order to be undestood easily,the toolbox also contains some samples.
I think this the first time every one can look at a PE crypter source in top level language such VC
I think this the first time every one can look at a PE crypter source
in top level language such VC++.
So as I promised ... if some one sent me one nice compress source I would
publish my source.
a book about VC.someone who want to learn vc should study the book.
a book about VC.someone who want to learn vc should study the book.
软件工程方法Prefactoring Prefactoring, in essence, is the art of applying the insights gleaned from previ
软件工程方法Prefactoring
Prefactoring, in essence, is the art of applying the insights gleaned from previous experience (whether yours or someone else s) when developing software to new projects. Doing so
This the project README file. Here, you should describe your project. Tell the reader (someone who d
This the project README file. Here, you should describe your project. Tell the reader (someone who does not know anything about this project) all he/she needs to know.
this is a flash opening for someone who like to download
this is a flash opening for someone who like to download
A bluetooth SMS patcher Java ME application I made quickly after I thought about making one. What i
A bluetooth SMS patcher Java ME application I made quickly after I thought about making one.
What is does is to use JSR-82 (Bluetooth API) to send a String msg, String dest to another phone running s
After decades of war one company, who had gained powerful supplying both sides with weaponary, steps
After decades of war one company, who had gained powerful supplying both sides with weaponary, steps forwards and crushes both warring factions in one swift movement. Using far superior weaponary and
为敏感电路提供过压和电源反接保护
<p>
</p>
<div>
What would happen if someone connected 24V to your12V circuits? If the power and ground lines were inadvertentlyreversed, would the circuits survive? Does yourapplication reside