Welcome![Sign In][Sign Up]
Location:
Search - LOCK.D

Search list

[Windows DevelopAccessEnumSource

Description: While the flexible security model employed by Windows NT-based systems allows full control over security and file permissions, managing permissions so that users have appropriate access to files, directories and Registry keys can be difficult. There s no built-in way to quickly view user accesses to a tree of directories or keys. AccessEnum gives you a full view of your file system and Registry security settings in seconds, making it the ideal tool for helping you for security holes and lock down permissions where necessary.-While the flexible security model employe d by Windows NT-based systems allows full Contr ol over security and file permissions, managing permissions so that users have approp riate access to files, directories and Registry keys can be difficult . There s no built-in way to quickly view user acc esses to a tree of directories or keys. AccessEn um gives you a full view of your file system and Re gistry security settings in seconds. making it the ideal tool for helping you for secu LAN holes and lock down permissions where nece ssary.
Platform: | Size: 108185 | Author: 李杰 | Hits:

[SMS2642-1

Description: //在tc3.0++在运行 //a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现 //c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格 //D(delete)表示已消去的方格.O(open)表示打开的方格. //变量m表示按回车键的有效次数.也是记忆力参数,越小记忆力越好 //变量xpos,ypos用于表示当前光标所在的位置 //(x1,y1),(x2,y2)用于记录打开的两个方格的位置 //judge()函数用于控制光标范围,使其不能移出长方形 //win()函数用于判断游戏是否过关,通过判断每个方格是否全是 D 状态 //xago,yago 用于记录移动前的位置 //ax,ay表示行列式的行与列,用它们来控制游戏的关数,ax位于3-6之间,ay位于4-7之间 //z来控制方格后的图形 //第一关后面的图形用1-6代表的图形.第二关后面的图形用0-9十个数。第三关后面的图形用A-O十五个字母, //第四关后面的图形用A-T二十一个字母-/ / tc3.0 running / / array for a randomly generated number, said 1-6 each box behind the plan fractal. with Inita () function to achieve / / c array used to record box at the state, characters used L (lock) had not opened the box / / D (delete) said it has been eliminated from the box. O (open) open the box. / / variable m expressed by the ENTER key to the effective number. also memory parameters, the smaller the better memory / / variable xpos, ypos said the current cursor for the location / / (x1, y1), (x2, y2) records for the two open box at the location / / judge () function used to control the cursor, it can not be moved out of a rectangular / / win () function used to judge whether the clearance game, each box by making a judgment whether the entire state of the D / / xago. Yago fir
Platform: | Size: 11903 | Author: 岳颖君 | Hits:

[Other resourceopensource

Description: Open Source for the Enterprise Open source software is changing the world of Information Technology. But making it work for your company is far more complicated than simply installing a copy of Linux. If you are serious about using open source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create new ways of working. You must understand how open source is different from commercial software and what responsibilities and risks it brings. Open Source for the Enterprise is a sober guide to putting open source to work in the modern IT department.-Open Source for the Enterprise Open source software is changing the world of Information T echnology. But making it work for your company i 's far more complicated than simply installing a copy of Linux. If you are serious about using ope n source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create ne w ways of working. You must understand how open s ource is different from commercial software an d what responsibilities and risks it brings. Op en Source for the Enterprise is a sober guide to p utting open source to work in the modern IT depar tment.
Platform: | Size: 593467 | Author: felix | Hits:

[Other resourceprogramandcircuit

Description: 30个典型的C语言应用实例:单片机实现7段数码管显示,基于MAX7219的8位数码管显示,MAX7219的工作时序和寄存器描述,单片机实现液晶显示,单片机实现电子密码锁, 单片机实现简单音乐发生器,单片机实现语音录放,基于MAX197的并行A/D转换,基于TLC549的串行A/D转换,基于MAX517的串行D/A转换,基于DS18B20的数字温度计设计等等,例子超多 包括了书中所有的程序代码和电路图,稍加修改便可用于自己的设计中去-30 C language typical application example : MCU seven of the digital control, Based on the eight MAX7219 digital control, the MAX7219 work time and register description, LCD MCU, the MCU electronic password lock, MCU simple music generator, MCU Voice Recording and Playback, MAX197 based on the parallel A / D conversion, Based on TLC 549 Serial A / D conversion, the serial Between MAX517 based on the D / A conversion, Based on the digital thermometer DS18B20 design, and so on, Examples include the more - all book of program code and circuit diagrams can be used for some amendments to its design to
Platform: | Size: 605924 | Author: huangdong0781 | Hits:

[Other4

Description: 学会对文件的记录锁定,及解锁。#include <stdio.h> #include <unistd.h> #include <fcntl.h> int main() { int fd int i struct { char name[20] uint ID int age } myrec fd =open(\"name\", O_RDWR|O_CREAT, 0755) if (fd == -1) return -1 printf(\"Input your name:\") scanf(\"%s\", myrec.name) printf(\"Inpute your ID :\") scanf(\"%d\", &myrec.ID) printf(\"Input your age :\") scanf(\"%d\", &myrec.age) lseek(fd, 0,SEEK_END) lockf(fd, 1, 0) write(fd, (void *)&myrec, sizeof(myrec)) lockf(fd, 0 ,0) return 0 } 执行命令cc lock.c –o lock.out Chmod +x lock.out ./lock.out
Platform: | Size: 9297 | Author: 华羿 | Hits:

[Process-Threadckaar

Description: 使用ntdll.dll中未公布的函数实现的资源读写加锁的例子-An example of realising resource lock of reading and writing by using unpublished function in ntdll.d
Platform: | Size: 3072 | Author: 站长 | Hits:

[Crack Hackxcapi-dll

Description: vc++编写的eky算法源码。 1、 用户确认eKey被锁定(使用“eKey测试”工具测试,显示错误代码为-9,则表示eKey被锁定)。-vc eky prepared by the algorithm source code. 1, the user mounts lock ( "CPU test" tests show that error code to-9, then the MPC lock).
Platform: | Size: 153600 | Author: 贺云 | Hits:

[Windows DevelopAccessEnumSource

Description: While the flexible security model employed by Windows NT-based systems allows full control over security and file permissions, managing permissions so that users have appropriate access to files, directories and Registry keys can be difficult. There s no built-in way to quickly view user accesses to a tree of directories or keys. AccessEnum gives you a full view of your file system and Registry security settings in seconds, making it the ideal tool for helping you for security holes and lock down permissions where necessary.-While the flexible security model employe d by Windows NT-based systems allows full Contr ol over security and file permissions, managing permissions so that users have approp riate access to files, directories and Registry keys can be difficult . There s no built-in way to quickly view user acc esses to a tree of directories or keys. AccessEn um gives you a full view of your file system and Re gistry security settings in seconds. making it the ideal tool for helping you for secu LAN holes and lock down permissions where nece ssary.
Platform: | Size: 107520 | Author: 李杰 | Hits:

[SMS2642-1

Description: //在tc3.0++在运行 //a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现 //c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格 //D(delete)表示已消去的方格.O(open)表示打开的方格. //变量m表示按回车键的有效次数.也是记忆力参数,越小记忆力越好 //变量xpos,ypos用于表示当前光标所在的位置 //(x1,y1),(x2,y2)用于记录打开的两个方格的位置 //judge()函数用于控制光标范围,使其不能移出长方形 //win()函数用于判断游戏是否过关,通过判断每个方格是否全是 D 状态 //xago,yago 用于记录移动前的位置 //ax,ay表示行列式的行与列,用它们来控制游戏的关数,ax位于3-6之间,ay位于4-7之间 //z来控制方格后的图形 //第一关后面的图形用1-6代表的图形.第二关后面的图形用0-9十个数。第三关后面的图形用A-O十五个字母, //第四关后面的图形用A-T二十一个字母-//tc3.0 running// array for a randomly generated number, said 1-6 each box behind the plan fractal. with Inita () function to achieve// c array used to record box at the state, characters used L (lock) had not opened the box// D (delete) said it has been eliminated from the box. O (open) open the box.// variable m expressed by the ENTER key to the effective number. also memory parameters, the smaller the better memory// variable xpos, ypos said the current cursor for the location// (x1, y1), (x2, y2) records for the two open box at the location// judge () function used to control the cursor, it can not be moved out of a rectangular// win () function used to judge whether the clearance game, each box by making a judgment whether the entire state of the D// xago. Yago fir
Platform: | Size: 11264 | Author: 岳颖君 | Hits:

[JSPopensource

Description: Open Source for the Enterprise Open source software is changing the world of Information Technology. But making it work for your company is far more complicated than simply installing a copy of Linux. If you are serious about using open source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create new ways of working. You must understand how open source is different from commercial software and what responsibilities and risks it brings. Open Source for the Enterprise is a sober guide to putting open source to work in the modern IT department.-Open Source for the Enterprise Open source software is changing the world of Information T echnology. But making it work for your company i 's far more complicated than simply installing a copy of Linux. If you are serious about using ope n source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create ne w ways of working. You must understand how open s ource is different from commercial software an d what responsibilities and risks it brings. Op en Source for the Enterprise is a sober guide to p utting open source to work in the modern IT depar tment.
Platform: | Size: 592896 | Author: felix | Hits:

[Other Embeded programlock

Description: 用keil c51 和protues联合起来对密码锁进行仿真,在没有开发板和研发调试来说,很有帮助的-Keil c51 with protues and locks together for simulation, in the absence of development boards and R & D testing, the helpful
Platform: | Size: 4096 | Author: 宛佳诺 | Hits:

[Windows DevelopADELlockSDKfunction

Description: 适用门锁接口:Lock3200.DLL,Lock3200K.DLL,Lock4200.DLL,Lock4200D.DLL,Lock5200.DLL,Lock6200.DLL,Lock7200.DLL,Lock7200D.DLL,Lock9200.DLL,Lock9200T.DLL。 适用门锁系统:V5.1及以上,V6.5以下版本。 -Applicable lock interface: Lock3200.DLL, Lock3200K.DLL, Lock4200.DLL, Lock4200D.DLL, Lock5200.DLL, Lock6200.DLL, Lock7200.DLL, Lock7200D.DLL, Lock9200.DLL, Lock9200T.DLL. Lock system to apply: V5.1 and above, V6.5 version of the following.
Platform: | Size: 19456 | Author: jssav | Hits:

[Crack HackLock

Description: 具体说来应该是占用文件夹或盘符 输入路径如d:\测试 点锁定就OK,退出后就是取消了, 密码1557-Specifically, should be occupied by a folder or drive letter Enter the path as d: \ test point lock on the OK, withdrawal is canceled, password 1557
Platform: | Size: 30720 | Author: hack1557 | Hits:

[Windows Developlock-DLL

Description: 可以吧dll注入到进程内存中执行,不是普通的iat 注入,非常好用-Dll can be injected into the process memory it performed, not the ordinary into the iat, very easy to use
Platform: | Size: 43008 | Author: mrhts | Hits:

[SCMD-Lock

Description: Digital Lock Code. It uses Keypad and EEPROM of PIC18F452 Microcontroller
Platform: | Size: 2048 | Author: Muhammad Tahir | Hits:

[JSP/Javalock

Description: 修改后的锁屏程序,间接阻止win+d、alt+f4,限于java的非底层性,alt+ctrl+del还无法屏蔽-The modified lock-screen process, indirectly prevent win+ d, alt+ f4, limited to java, alt+ ctrl+ del can not shield
Platform: | Size: 304128 | Author: 终曲 | Hits:

[OtherHaivb6

Description: 海贝斯门锁VB演示程序,包含所需的动态链接库,本人亲自测试通过-Haibei Si lock VB demo program, including the required dynamic link library, I personally tested by
Platform: | Size: 754688 | Author: hehe | Hits:

[SCMprotues-fazhen-2

Description: 万年历 矩阵键盘 数字电压 密码锁 多模式带音乐跑马灯 数字倒计时器 函数信号发生器-Calendar matrix keyboard digital voltage lock digital multi-mode countdown timer with music Marquee Function Generator
Platform: | Size: 228352 | Author: 李强 | Hits:

[Hook apiLock-Computer

Description: 一个给电脑加锁的程序,调用了 KBHook.dll 全局键盘钩子,程序用繁体VB6编写,里面含 instgb5 在VB IDE环境中转换的工具. 这个工具我用了很多年,ctrl配合方向键可以简繁体转换..具体看右下角的图标的帮助. 一个台湾朋友写的.. 真的非常好用.. -允许输入拉丁字符的拼音 请键入文字或网站地址,或者上传文档。 取消 Yīgè gěi diànnǎo jiā suǒ de chéngxù, diàoyòngle KBHook.Dll quánjú jiànpán gōuzi, chéngxù yòng fántǐ VB6 biānxiě, lǐmiàn hán instgb5 zài VB IDE huánjìng zhōng zhuǎnhuàn de gōngjù. Zhège gōngjù wǒ yòngle hěnduō nián,ctrl pèihé fāngxiàng jiàn kěyǐ jiǎn fántǐ Zhuǎnhuàn.. Jùtǐ kàn yòu xiàjiǎo de túbiāo dì bāngzhù. Yīgè táiwān péngyǒu xiě de.. Zhēn de fēicháng hǎo yòng.. 将中文译成英语 中文(简体) 英语 日语 To lock a computer program, called KBHook.dll global keyboard hook, the program written in Traditional VB6, which contain instgb5 in the VB IDE environment conversion tool, this tool I use for many years, ctrl with the arrow keys can be simplified and traditional conversion .. the lower right corner of the icon to see specific help to write a Taiwanese friend .. really nice ..
Platform: | Size: 97280 | Author: 曉風 | Hits:

[Communication-MobileRfid D-Lock

Description: Interface test software demo RFID D-LOCK
Platform: | Size: 337920 | Author: Andriyono | Hits:
« 12 »

CodeBus www.codebus.net