Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program
OS program list
Sort by :
« 1 2 ... .69 .70 .71 .72 .73 16074.75 .76 .77 .78 .79 ... 16281 »
Downloaded:0
WIN2000 the principle of virtual memory mechanism simulation and fully realize without using MFC, Win32 and entirely DDK achieve. Design thinking is very beautiful.
Update : 2008-10-13 Size : 5.97kb Publisher : wtm

Downloaded:0
core Windows programming Exception handling mechanism and the full realization of copying, using WIN32 and DDK no use MFC.
Update : 2008-10-13 Size : 2.25kb Publisher : wtm

This paper presents a practical example of the uClinux-based TCR development design.
Update : 2008-10-13 Size : 4.53mb Publisher : 王飞

This paper introduces the embedded Linux operating system serial programming method. The need for the serial programming will help.
Update : 2008-10-13 Size : 237.24kb Publisher : 王飞

This paper introduces a Linux dial-up service under way, illustrate how changes PPP settings.
Update : 2008-10-13 Size : 7.47kb Publisher : 王飞

here to explain how to read through the Windows registry IP information and no need to restart the computer in the case of changes to make the IP address in force, with source code
Update : 2008-10-13 Size : 14.66kb Publisher : 杨俊杰

Downloaded:0
be right for the network access control information unpacked running HSSniffer \ SeniorProject \ SnifferUI \ bin \ Debug \ snifferUI.exe can, enjoy it!
Update : 2008-10-13 Size : 448.75kb Publisher : 宋晓

Downloaded:0
activehdl the crack, crack experts, many people used the absolute ease of use, and if necessary can be used to download
Update : 2008-10-13 Size : 62kb Publisher : dsfd

Downloaded:0
pos machine transactions with the source code to achieve financial card transactions 8583 agreement to achieve development environment : linux Typical applications : embedded system development is for reference only
Update : 2008-10-13 Size : 2.65mb Publisher : 孙庆君

Downloaded:0
Linux system backup source code can be based on user-defined strategy to achieve systems, applications, data backup
Update : 2008-10-13 Size : 200.97kb Publisher : 孙庆君

Downloaded:0
Programming cryptographic key conversation was very important MSDN demonstrated a method of using the private key. But in Microsoft's MSDN examples longer. Presented below is the method not only faster and more effective
Update : 2008-10-13 Size : 2.9kb Publisher : ww2aa

Downloaded:0
recording system monitors the use of CPU, the use of threads records, the use of disk cache record speed, memory, etc. Records
Update : 2008-10-13 Size : 24.27kb Publisher : ww2aa
« 1 2 ... .69 .70 .71 .72 .73 16074.75 .76 .77 .78 .79 ... 16281 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.