-
-
[
Visual C++ (VC++)]
bahuanghou.rar
... the nineteenth century, the famous mathematician Gauss in 1850: Under the 8X8 grid placed eight on the chess queen, so that it can not attack each other, that is, any two Queens can not be in the same row, same column or the same slash on, and asked how ...
-
[
Visual C++ (VC++)]
20060816.rar
To the grid as a logical structure, with high Unicom, low load, expansion and strong features. The analysis shows that the program more efficient, safe, stronger anti-attack capability.
Category:
matlab Upload User:
cwh0514 Size:
189K
-
[
DOS]
arp.rar
Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
-
-
[
CHM]
DOS.rar
... , clear the CMOS password- DOS Command Applications (4)
6, once and for all- a batch command (1)
7, so that CIH never attack- a batch command (2)
8, Qiao-based power-on password, etc.- a batch command (3)
9, DOS classic software
10, DOS Classics ...
Category:
C++ eBooks Upload User:
newvector Size:
572K
-
[
PDF]
Aerodynam.rar
... dynamics software to have the head of the projectile angle of attack aerodynamic performance of the numerical calculation, analysis of a head attack angle shot and the role of the flow field around the surface of the projectile aerodynamics. ...
Category:
Algorithm Upload User:
sqruiyu Size:
224K
-
[
PDF]
simulation.rar
... grid technology, coupled equations for solving Euler equations and ballistics, flight simulation at 46 km altitude, 0 ° angle of attack, Mach 6.5, the shell-chip separation velocity, respectively 6mPs , 12mPs, angular separation of the shell pieces were ...
-
[
Visual C++ (VC++)]
keqiangzhanshiduanzuoye.rar
... it requires estimates of job runtimes to be available. Another problem is that it moves forwards as many smaller jobs as possible. It is unfair to the larger ones. To attack these problems, we propose a new method, Priority-based Preemptive Scheduling.
Category:
Document Upload User:
tengle669 Size:
225K
-
[
Visual C++ (VC++)]
myrsa.zip
... ① through practical programming in non-asymmetric cryptographic algorithm RSA encryption and decryption as well as rapid encryption and decryption process, to deepen understanding of asymmetric cryptographic algorithm. ② realize RSA decryption key attack.
-
[
ASP/ASPX(.net)]
e269nethy.rar
... to search, modify, delete, lock member
7. Member MD5 password encryption, anti-SQL injection attacks, cross-site attack prevention, anti-Database downloads
8. Code optimization, compatibility strong, safe and effective, easy to use
Manager Name: ...