在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
Fortran has always been the principal language used in the fields of scientific, numerical, and engineering programming, and a series of revisions to the standard defining successive versions of the language has progressively enhanced its power and kept it competitive with several generations of rivals. Beginning in 1978, the technical committee responsible for the development of Fortran standards, X3J3 (now called J3), laboured to produce a new, much- needed modern version of the language, Fortran 90. Its purpose is to "promote portability, reliability, maintainability, and efficient execution... on a variety of computing systems". The standard was published in 1991, and work began in 1993 on a minor revision, known informally as Fortran 95. Now this revised
标签: scientific the principal numerical
上传时间: 2017-04-12
上传用户:a3318966
THIS DOCUMENT IS ALL ABOUT THE NANOTECHONOLOGY AND IT USES USING THIS NANO WE CAN IMPLEMENT A 1TB IN 100GM HARDDISK,,,THAT MUCH TINY ,,
标签: THIS NANOTECHONOLOGY IMPLEMENT DOCUMENT
上传时间: 2017-04-26
上传用户:aeiouetla
Learn how to: * Tokenize a null-terminated string * Create a search and replace function for strings * Implement subtraction for string objects * Use the vector, deque, and list sequence containers * Use the container adaptors stack, queue, and priority_queue * Use the map, multimap, set, and multiset associative containers * Reverse, rotate, and shuffle a sequence * Create a function object * Use binders, negators, and iterator adapters * Read and write files * Use stream iterators to handle file I/O * Use exceptions to handle I/O errors * Create custom inserters and extractors * Format date, time, and numeric data * Use facets and the localization library * Overload the [ ], ( ), and -> operators * Create an explicit constructor * And much, much more
标签: null-terminated Tokenize Create string
上传时间: 2014-01-18
上传用户:yph853211
Want to try a copy of Linux 2.6.29-rc5 in progess with Angstom and Opie? Opie probably isn t good for much but testing but it is kind of fun. This has a very slow boot, which is much improved since this NAND image was made. NAND image of Linux 2.6.9-rc5 with Angstrom and Opie for test. Download file. Set to NOR and power on. Install using the vivi command "Restore NAND Flash from HOST thru USB" Turn off, set to NAND, turn on. Enjoy.
标签: Opie probably Angstom progess
上传时间: 2013-12-17
上传用户:gaojiao1999
The computing world has undergone a revolution since the publication of The C Programming Language in 1978. Big computers are much bigger, and personal computers have capabilities that rival mainframes of a decade ago. During this time, C has changed too, although only modestly, and it has spread far beyond its origins as the language of the UNIX operating system
标签: Programming publication revolution The
上传时间: 2017-05-16
上传用户:thinode
Abstract—In this paper, we propose transform-domain algorithms to effectively classify the characteristics of blocks and estimate the strength of the blocky effect. The transform-domain algorithms require much lower computational complexity and much less memory than the spatial ones. Along with the estimated blocky strength,
标签: transform-domain effectively algorithms Abstract
上传时间: 2017-06-16
上传用户:zukfu
A user-space device driver can do many of the things that kernel drivers can t, such as perform a long-running computation, block while waiting for an event, or read files from the file system. Unlike kernel drivers, a user-space device driver can use other device drivers--that is, access the network, talk to a serial port, get interactive input from the user, pop up GUI windows, or read from disks. User-space drivers implemented using FUSD can be much easier to debug it is impossible for them to crash the machine, are easily traceable using tools such as gdb, and can be killed and restarted without rebooting even if they become corrupted. FUSD drivers don t have to be in C--Perl, Python, or any other language that knows how to read from and write to a file descriptor can work with FUSD. User-space drivers can be swapped out, whereas kernel drivers lock physical memory.
标签: user-space can drivers perform
上传时间: 2014-01-01
上传用户:saharawalker
Besides enhanced looks and advanced features, one of the best things about Swing is its pluggable look and feel (PLAF). PLAF architecture allows seamless changes in the appearance of an application and the way an application interacts with the user. However, designing and developing a PLAF is much more exhaustive and complex. On the other hand, themes provide a simple alternative to change look and feel of the swing application. Themes are easier to implement and they enhance the visual appeal of the application UI using the default Java look and feel. Theme mechanism allows a developer to easily specify the default colors, fonts and icons used by the look and feel (L&F). It allows developers to write their own themes giving them a choice to show their application GUI the way they want it, rather than depending on the defaults provided by the system.
标签: pluggable enhanced advanced features
上传时间: 2014-01-23
上传用户:253189838
The NetBeans IDE has seen adoption snowballing over the past years, particularly with the introduction of a completely new, rewritten, slick Java editor. You’ll fnd this reference card helpful if you want to get as much out of the Java editor as its authors intended when creating it. It lists all the keyboard shortcuts in carefully thought out categories and it provides a thorough exposition of optimal handling of Java code in the editor, covering viewing, navigation, source handling, and refactoring. Get NetBeans IDE: http://www.netbeans.org/downloads
标签: particularly snowballing the NetBeans
上传时间: 2014-01-23
上传用户:气温达上千万的