-
一个PERL读CONFIG的PM程序,大家试试,以前我做项目用过的.
一个PERL读CONFIG的PM程序,大家试试,以前我做项目用过的.-CONFIG read a PERL of PM procedures, U.S. try, I used to do the project.
- 2022-06-12 01:24:18下载
- 积分:1
-
sun under Linux Network Programming, we help;
sun Linux 下的网络编程,对大家有所帮助;-sun under Linux Network Programming, we help;
- 2022-01-25 23:25:08下载
- 积分:1
-
UC TC/PIC,This file is part of the uIP TCP/IP stack.
UC TC/PIC,This file is part of the uIP TCP/IP stack.
- 2022-07-04 02:18:03下载
- 积分:1
-
关于linux下基于QT界面socket编程的简单实例
关于linux下基于QT界面socket编程的简单实例 -based on the QT socket programming interface simple example
- 2022-04-09 13:41:06下载
- 积分:1
-
Linux下的TCP端口扫描程序
Linux下的TCP端口扫描程序
--软件学院信息安全产品开发实践课程作业答案。-A reference of TCP PortScan program.
- 2022-01-25 19:28:05下载
- 积分:1
-
Vista 核心Rally技术之
Vista 核心Rally技术之-LLTD
实现源代码-Vista core Rally technology-LLTD realize the source code
- 2023-08-27 10:25:04下载
- 积分:1
-
linphone源码
linphone源码-1.3.5.tar.gz所需要的库文件-linphone source-1.3.5.tar.gz needs of the library
- 2022-04-10 08:07:25下载
- 积分:1
-
zy2440启动源代码的loarder WinCE 5系统
the zy2440 boot loarder source code for wince 5.0 system
- 2022-03-17 00:06:54下载
- 积分:1
-
NAME: gmfsk
VERSION: 0.6
RELEASE: 1
SUMMARY: Gnome MFS...
NAME: gmfsk
VERSION: 0.6
RELEASE: 1
SUMMARY: Gnome MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER terminal
DISTRIBUTION: OH2BNS
VENDOR: OH2BNS
LICENSE: GPL
PACKAGER: Tomi Manninen
GROUP: Applications/Communications
OS: linux
ARCH: i386
SOURCE RPM: gmfsk-0.6-1.src.rpm
DESCRIPTION:
gMFSK is a terminal program for MFSK, RTTY, THROB, PSK31, MT63
and HELLSCHREIBER.
-NAME: gmfsk
VERSION: 0.6
RELEASE: 1
SUMMARY: Gnome MFSK, RTTY, THROB, PSK31, MT63 and HELLSCHREIBER terminal
DISTRIBUTION: OH2BNS
VENDOR: OH2BNS
LICENSE: GPL
PACKAGER: Tomi Manninen
GROUP: Applications/Communications
OS: linux
ARCH: i386
SOURCE RPM: gmfsk-0.6-1.src.rpm
DESCRIPTION:
gMFSK is a terminal program for MFSK, RTTY, THROB, PSK31, MT63
and HELLSCHREIBER.
- 2023-04-19 02:15:04下载
- 积分:1
-
* To protect our network from unauthorized users.
* Access permissions are al...
* To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.
-* To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.
- 2022-05-23 07:33:07下载
- 积分:1