切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual C++ (VC++)] bahuanghou.rar ... the nineteenth century, the famous mathematician Gauss in 1850: Under the 8X8 grid placed eight on the chess queen, so that it can not attack each other, that is, any two Queens can not be in the same row, same column or the same slash on, and asked how ...
    Category: Mathimatics-Numerical algorithms Upload User:kexingong Size:5K
  • [Visual C++ (VC++)] 20060816.rar To the grid as a logical structure, with high Unicom, low load, expansion and strong features. The analysis shows that the program more efficient, safe, stronger anti-attack capability.
    Category: matlab Upload User:cwh0514 Size:189K
  • [DOS] arp.rar Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
    Category: Internet-Socket-Network Upload User:cnn2000 Size:3K
  • [Visual C++ (VC++)] DDosAttack.rar DDos attack on multi-threaded C source code, Visual Studio 2005 platform has been measured
    Category: Internet-Socket-Network Upload User:jsjyd88 Size:2361K
  • [CHM] DOS.rar ... , clear the CMOS password- DOS Command Applications (4) 6, once and for all- a batch command (1) 7, so that CIH never attack- a batch command (2) 8, Qiao-based power-on password, etc.- a batch command (3) 9, DOS classic software 10, DOS Classics ...
    Category: C++ eBooks Upload User:newvector Size:572K
  • [PDF] Aerodynam.rar ... dynamics software to have the head of the projectile angle of attack aerodynamic performance of the numerical calculation, analysis of a head attack angle shot and the role of the flow field around the surface of the projectile aerodynamics. ...
    Category: Algorithm Upload User:sqruiyu Size:224K
  • [PDF] simulation.rar ... grid technology, coupled equations for solving Euler equations and ballistics, flight simulation at 46 km altitude, 0 ° angle of attack, Mach 6.5, the shell-chip separation velocity, respectively 6mPs , 12mPs, angular separation of the shell pieces were ...
    Category: Windows Develop Upload User:fjjnled Size:460K
  • [Visual C++ (VC++)] keqiangzhanshiduanzuoye.rar ... it requires estimates of job runtimes to be available. Another problem is that it moves forwards as many smaller jobs as possible. It is unfair to the larger ones. To attack these problems, we propose a new method, Priority-based Preemptive Scheduling.
    Category: Document Upload User:tengle669 Size:225K
  • [Visual C++ (VC++)] myrsa.zip ... ① through practical programming in non-asymmetric cryptographic algorithm RSA encryption and decryption as well as rapid encryption and decryption process, to deepen understanding of asymmetric cryptographic algorithm. ② realize RSA decryption key attack.
    Category: Crypt_Decrypt algrithms Upload User:jfhjwxh Size:37K
  • [ASP/ASPX(.net)] e269nethy.rar ... to search, modify, delete, lock member 7. Member MD5 password encryption, anti-SQL injection attacks, cross-site attack prevention, anti-Database downloads 8. Code optimization, compatibility strong, safe and effective, easy to use Manager Name: ...
    Category: Other systems Upload User:bayernwjz Size:50K