-
的ks8995包含五个10 / 100物理层
The KS8995 contains five 10/100 physical layer
transceivers, five MAC (Media Access Control) units
with an integrated layer 2 switch. The device runs in
two modes. The first mode is a five port integrated
switch and the second is as a five port switch with the
fifth port decoupled from the physical port. In this
mode access to the fifth MAC is provided using a
MII (Media Independent Interface).
- 2022-02-10 04:57:09下载
- 积分:1
-
Windows未公开API说明和源码例子
Windows未公开API说明和源码例子
- 2022-02-10 17:13:03下载
- 积分:1
-
detection cpu source code
检测cpu的源代码-detection cpu source code
- 2022-03-10 15:49:08下载
- 积分:1
-
这篇文档是在Windows NT操作系统下隐藏对象、文件、服务、进程等的技术。这种方法是基于Windows API函数的挂钩。 这篇文章中所描述的技术都是从我写...
这篇文档是在Windows NT操作系统下隐藏对象、文件、服务、进程等的技术。这种方法是基于Windows API函数的挂钩。 这篇文章中所描述的技术都是从我写rootkit的研究成果,所以它能写rootkit更有效果并且更简单。这里也同样包括了我的实践。 在这篇文档中隐藏对象意味着改变某些用来命名这些对象的系统函数,使它们将忽略这些对象的名字。这样一来我们改动的那些函数的返回值表示这些对象根本就不存在。 最基本的方法(除去少数不同的)是我们用原始的参数调用原始的函数,然后我们改变它们的输出。 在这篇文章里将描述隐藏文件、进程、注册表键和键值、系统服务和驱动、分配的内存还有句柄。-This document is in the Windows NT operating system hidden objects, documents, services, process technology. This method is based on the Windows API function link. This article describes techniques are, I wrote rootkit from the results of research, so it was rootkit more effective and more simple. Here, too, including my practice. In this document hidden object means certain changes to these objects naming system functions so that they will ignore these objects by name. So we change those functions return values, said these objects simply do not exist. The most basic method (excluding a few different) is that we should call the original parameters of the original function, and then we change their
- 2022-03-07 17:00:50下载
- 积分:1
-
change memory Demonstration Program VB
修改内存演示程序VB-change memory Demonstration Program VB
- 2022-07-20 06:05:58下载
- 积分:1
-
Computer Activity Monitoring System Introduction: Through the system, network ad...
- 2023-06-06 22:40:03下载
- 积分:1
-
测试 PB 调用DLL
测试 PB 模块嵌入历史系统
测试 PB 调用DLL
测试 PB 模块嵌入历史系统-PB test PB call DLL modules embedded in the history of test system
- 2023-06-12 13:00:04下载
- 积分:1
-
the Windows clipboard procedures, more practical
Windows下的剪贴板程序,比较实用-the Windows clipboard procedures, more practical
- 2022-04-08 15:05:09下载
- 积分:1
-
cmd漏洞源代码 非常值得研究
cmd漏洞源代码 非常值得研究-cmd loopholes source code is worth studying
- 2022-01-26 04:55:11下载
- 积分:1
-
从txt文件中读取日志数据分析并将分析结果输出到XML文件中,其中含有CMarkup(VC下操作XML文件)类,本人原创编写:)...
从txt文件中读取日志数据分析并将分析结果输出到XML文件中,其中含有CMarkup(VC下操作XML文件)类,本人原创编写:)-Txt file to read from the log data analysis and the results of the analysis output to XML file, which contains CMarkup (VC operation XML file) category, I prepared original:)
- 2023-02-19 12:40:03下载
- 积分:1