-
Linux管理员手册,大家有兴趣就多看看吧
Linux管理员手册,大家有兴趣就多看看吧-Linux Administrator Manual, we are interested in more to see it! ! ! !
- 2022-03-12 16:10:24下载
- 积分:1
-
的最新版本
PHPBB最新版本-PHPBB newest edition
- 2022-06-11 19:28:38下载
- 积分:1
-
模式2.1
Motif 2.1 - Programmer s Guide-Motif 2.1- Programmer s Guide
- 2022-05-05 19:32:45下载
- 积分:1
-
linux 1.0的源码 觉得看一看还是很重要的,大家学习学习
linux 1.0的源码 觉得看一看还是很重要的,大家学习学习-think that the linux 1.0 source code take a look at the still very important, we learn
- 2022-11-22 00:00:03下载
- 积分:1
-
在linux平台下学习so文件而编写的例子。
在linux平台下学习so文件而编写的例子。-In linux platform to learn so documents prepared examples.
- 2023-05-07 22:20:02下载
- 积分:1
-
宽度= gdk_pixbuf_animation_get_width(ANI)
width = gdk_pixbuf_animation_get_width(ani)
height = gdk_pixbuf_animation_get_height(ani)
current_frame_list = gdk_pixbuf_animation_get_frames(ani)
pixmap = gdk_pixmap_new(w->window, width, height, -1)
clean_pixmap = gdk_pixmap_new(w->window, width, height, -1)
if (w->style->bg_pixmap[GTK_STATE_NORMAL]) {
GdkPixmap *bg = w->style->bg_pixmap[GTK_STATE_NORMAL]
GdkGC *gc
GdkGCValues values
values.tile = bg
values.fill = GDK_TILED
gc = gdk_gc_new_with_values(w->window, &values,
GDK_GC_FILL|GDK_GC_TILE)
gdk_gc_set_ts_origin(gc,
(w->allocation.width - width)/2,
(w->allocation.height-height)/2)
gdk_draw_rectangle(clean_pixmap,gc, TRUE,
0, 0, width, height)
gdk_gc_destroy(gc)
} else {
gdk_draw_rectangle(clean_pixmap,
w->style->bg_gc[GTK_STATE_NORMAL],
TRUE, 0, 0, width, height)
}- width = gdk_pixbuf_animation_get_width(ani)
- 2022-05-17 15:10:31下载
- 积分:1
-
S3C2410硬件平台的LINUX DM9000AE驱动
S3C2410硬件平台的LINUX DM9000AE驱动-S3C2410 hardware platform LINUX DM9000AE Drivers
- 2022-08-31 23:35:03下载
- 积分:1
-
source sip, sip proxy server on the use of Osip Library
sip的源码,关于sip 代理服务器的,使用Osip库-source sip, sip proxy server on the use of Osip Library
- 2022-06-21 09:06:05下载
- 积分:1
-
unix下线程池编程
unix下线程池编程-programming Thread Pool
- 2022-02-21 03:39:48下载
- 积分:1
-
trampling stack [C programming language] n. In many C language implementation, i...
践踏堆栈 [C语言编程] n. 在许多C语言的实现中,有可能通过写入例程 中所声明的数组的结尾部分来破坏可执行的堆栈. 所谓 践踏堆栈 。使用的 代码可以造成例程的返回异常,从而跳到任意的地址.这导致了一些极为险恶的数据相关漏洞-trampling stack [C programming language] n. In many C language implementation, it may be passed into routines statement by the end of the array to undermine executable stack. The so-called abuses stack. The code can cause abnormal return to the routines, jumping arbitrary address. This has led to some extremely dangerous loopholes in the relevant data
- 2022-03-18 08:38:15下载
- 积分:1