虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Step

  • Every day, patches are created to cover up security holes in software applications and operating sys

    Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one Step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.

    标签: applications operating security software

    上传时间: 2015-10-31

    上传用户:fhzm5658

  • Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID

    Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID Support blind transfer, single-Step transfer/conference, consultation transfer/conference, hold, unhold. Control of the local phone handset, microphone and speaker of the modem Send and receive faxes Play and record on the phone line or sound card Play music in background mode Silence detection VU Meter Wave sound editor that allows your end-users to edit their own sound files. Voice recognition and voice synthesis. Full control over the serial port device ZModem file transfer utility File compression and encryption utility

    标签: phone and Capture Detect

    上传时间: 2013-11-30

    上传用户:水中浮云

  • this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 compu

    this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 in a larger model, TOP_LC2 that adds video output. Push buttons reset and single Step the processor and a video output display of registers is generated. This state machine VHDL-based model of the LC-2 includes all source files. Currently compiled for a Cyclone EP1C6Q240 FPGA.

    标签: implementation include quartus source

    上传时间: 2013-12-25

    上传用户:坏坏的华仔

  • DAGON Approach Object of this exercise: Given a subject graph and a set of pattern graph in canoni

    DAGON Approach Object of this exercise: Given a subject graph and a set of pattern graph in canonical representation (2-input NAND and INV), implement the second Step of DAGON approach. (Both the subject graph and the pattern graphs are trees.)

    标签: graph Approach exercise subject

    上传时间: 2014-01-19

    上传用户:stampede

  • We present a particle filter construction for a system that exhibits time-scale separation. The sep

    We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factorization of the transition probability which allows the Rao-Blackwellization of the filtering Step. Both simplifications can be implemented using the coarse projective integration framework. The resulting particle filter is faster and has smaller variance than the particle filter based on the original system. The convergence of the new particle filter to the analytical filter for the original system is proved and some numerical results are provided.

    标签: construction separation time-scale particle

    上传时间: 2016-01-02

    上传用户:fhzm5658

  • ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题

    ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题,并且可以处理其它编译器无法解决的难题。 一,什么是 OllyDbg? 二,一般原理[General principles] 三,反汇编器[Disassembler] 四,分析器[Analysis] 五,Object扫描器[Object scanner] 六,Implib扫描器 [Implib scanner] 七,如何开始调试[How to start debugging session] 八,CPU 窗口[CPU window] 九,断点[Breakpoints] 十,内存映射窗口[Memory map window] 十一、十二,监视与监察器[Watches and inspectors] 十三,线程[Threads] 十四,复制到剪切板[Copy to clipboard] 十五,调用栈[Call stack] 十六,调用树[Call tree] 十七,选项[Options] 十八,搜索[Search] 十九,自解压文件[Self-extracting (SFX) files] 二十,单步执行与自动执行[Step-by-Step execution and animation] 二一,Hit跟踪[Hit trace]

    标签: ollydbg OllyDbg 32 教程

    上传时间: 2016-01-02

    上传用户:xhz1993

  • this will produce the dci program in the src/ directory, or in /path/to/your/installation/bin if y

    this will produce the dci program in the src/ directory, or in /path/to/your/installation/bin if you used the--prefix option during the configure Step and issued a "make install".

    标签: installation directory the produce

    上传时间: 2016-01-04

    上传用户:15071087253

  • matlab 实现系统的参数计算

    matlab 实现系统的参数计算,系统单位阶跃响应的相关参数计算。Matlab real system parameters, the system unit Step response of the relevant parameters.

    标签: matlab 参数计算

    上传时间: 2014-01-07

    上传用户:曹云鹏

  • Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your startin

    Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next Step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until :  The exit is found (a free square other than the starting position is reached on the very edge of the maze), or,  No more free squares are available, and hence no exit is possible.

    标签: method ink-blotting Blotting escaping

    上传时间: 2014-12-03

    上传用户:123啊

  • UNIX下的硬件代码检查工具的使用

    UNIX下的硬件代码检查工具的使用,Step by Step.Synopsys很好的工具文档。

    标签: UNIX 硬件 代码 检查工具

    上传时间: 2016-02-05

    上传用户:英雄