登录
首页 » DOS » Automatic-setting-network

Automatic-setting-network

于 2012-10-15 发布 文件大小:3KB
0 223
下载积分: 1 下载次数: 9

代码说明:

  此批处理可自动生成配置信息,并智能识别有效的配置信息进行过相应网卡信息配置,结合“导出网络配置.bat”批处理使用可方便的进行网络信息的备份及修改 :: 本批处理适用于网络维护人员进行网络配置信息的备份与恢复,同时也是极佳的批处理学习参考代码,其中涉及字符串切割、文件读取及行数判断、注册表修改、生成可变参量等技术,为批处理编程人员及初学爱好者提供良好的参考 (This batch can automatically generate configuration information, and intelligent identification configuration information through the appropriate network card information to configure, combined with the " export network configuration. Bat" batch convenient backup and modify network information :: this batch apply backup and restore the network configuration information, network maintenance personnel, is also an excellent batch learning reference code, which involve strings cut, file read and the number of rows to determine the registry modification generating technologies such as variable parameters, in order to batch programming and novice enthusiasts to provide a good reference)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ReliefF-2
    由于Relief算法比较简单,运行效率高,并且结果也比较令人满意,因此得到广泛应用,但是其局限性在于只能处理两类别数据,因此1994年Kononeill对其进行了扩展,得到了ReliefF作算法,可以处理多类别问题。该算法用于处理目标属性为连续值的回归问题。(Because Relief algorithm is relatively simple, high efficiency, and the results are more satisfactory, so widely used, but its limitation is that only two types of data can be processed, so Kononeill in 1994 to expand it, get ReliefF algorithm , Can handle multiple categories of problems. The algorithm is used to deal with the regression problem that the target attribute is a continuous value.)
    2017-05-28 21:08:48下载
    积分:1
  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • filejioner
    将现有多个文件修改后缀名,并合并为一个txt文件(More than one file to modify the existing extension, and combined into a txt file)
    2011-10-18 21:45:30下载
    积分:1
  • telnet
    telnet 工具 解决windows 7下无telnet命令问题(telnet tools)
    2015-11-10 16:33:07下载
    积分:1
  • aa
    说明:  会发声的批处理 会发声的批处理 会发声的批处理(hui fa sheng)
    2013-06-21 16:38:50下载
    积分:1
  • GetFilesNameInBatch
    通过拖拽操作(拖放操作)批次取得文件名,自动保存为文本文件,方便命令行带参数方式批处理文件的编写.(Through drag-and-drop operations (drag and drop) to obtain the batch file name, automatically saved as a text file for command-line batch file with the parameters of the preparation methods.)
    2009-05-26 20:02:56下载
    积分:1
  • protues8[1]
    protues8[1].0安装教程protues8 [1] .0 Installation Tutorial(protues8 [1] .0 Installation Tutorialprotues8 [1] .0 Installation Tutorial)
    2013-11-10 09:14:33下载
    积分:1
  • CPL
    Sample Code to make CPL-applet by using WinAPI only. It s simple applet just start notepad, but you can modify it to your needs. Output file is just 40 kb.
    2013-10-17 00:51:08下载
    积分:1
  • 把一个文件转成十六进制的字符,方便制作shellcode
    它可以把一个文件转成十六进制的字符,方便制作shellcode,或者反过来,把十六进的字符转成二进制的数据。还有,他可以运行指定的shellcode(the tool can translate file from a hex char,and it translate binary from hex char.and it also run your shellcode)
    2014-01-13 09:07:18下载
    积分:1
  • mString4
    It is part of String Algorithm source code 004/005
    2011-01-30 06:41:03下载
    积分:1
  • 696518资源总数
  • 106245会员总数
  • 18今日下载