-
Also a learning Smart Card a good example of operational control, the company s...
又一个学习智能卡操作控制的好例子,公司里的产品-Also a learning Smart Card a good example of operational control, the company s products
- 2022-01-26 14:53:03下载
- 积分:1
-
a procedure to help illustrate a tool kit in the DOS
一个帮助程序可以说明 一个工具包在DOS下的 有很多式具-a procedure to help illustrate a tool kit in the DOS- with a lot of
- 2022-05-19 13:25:00下载
- 积分:1
-
DMA
9054的DMA驱动实现
9054的DMA驱动实现-DMA-driven 9054
- 2023-06-18 22:00:04下载
- 积分:1
-
显示NT机器运行的总时间
显示NT机器运行的总时间- Demonstrates the NT machine movement the total time
- 2022-01-31 15:58:53下载
- 积分:1
-
ATL开发指南(第二版)的源代码,使用COM内存管理…
ATL开发指南(第二版)源代码,使用COM的内存管理和错误处理功能,实现COM+的最新功能-ATL Development Guide (2nd Edition) source code, the use of COM memory management and error handling function, Implementation of the latest functional COM
- 2022-01-25 18:44:54下载
- 积分:1
-
增加TLS的例子 呵呵
增加TLS的例子 呵呵 -increase TLS examples of increased TLS- huh-huh example of the increasing examples Oh TLS
- 2022-03-04 05:47:12下载
- 积分:1
-
《如何提取并保存图标资源》配套源代码想自己动手也做一个适合自己的图标提取工具呢?下面,就让我用我以前做过的一个工具<轻轻松松抓图标>来告诉你吧!它可以提取各种文...
《如何提取并保存图标资源》配套源代码想自己动手也做一个适合自己的图标提取工具呢?下面,就让我用我以前做过的一个工具<轻轻松松抓图标>来告诉你吧!它可以提取各种文件中的图标资源,并可将其保存为图标(ICO)、位图(BMP)两种格式。-"how to extract resources and the preservation icon" complementary to the source code yourself have done an icon for the extraction tool? Here, let me use my done before a tool tell you! It can extract various documents icon resources and the preservation of its icon (ICO), bitmap (BMP) format.
- 2022-02-04 02:41:23下载
- 积分:1
-
微妙定时GetTime,微秒级别的定时器,源代码
微妙定时GetTime,微秒级别的定时器,源代码-Delicate timing GetTime, microsecond-level timer, source code
- 2022-06-14 19:19:08下载
- 积分:1
-
信号量的类封装,适合C++开发,通过此类,能够直接对信号量进行创建、关闭等操作开发。...
信号量的类封装,适合C++开发,通过此类,能够直接对信号量进行创建、关闭等操作开发。-Semaphore class package for C++ development, through such, can be carried out directly on the semaphore creation, closure, and so operate the development.
- 2022-01-21 06:21:38下载
- 积分:1
-
这4个部分系列将讨论的窗口访问控制模型,以及它是如何。
This 4 part series will discuss the Windows access control model and how it is implemented in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descriptors. We will solve trivial problems using the SID, obtain information from an access token, enable a privilege, fill up an access control list, and finally we will check if we have access to a resource. The demo project provided is a Whoami clone written Windows 2000 style. The source code includes equivalent programs of the article s code written with the Low level APIs, the Windows 2000 APIs, and the Active Template Library.
- 2022-04-24 18:59:16下载
- 积分:1