slice) or a1h (from the slice).3. Write the ICW3 to Port 21h (main slice) or a1h (from the slice).4. Write the ICW4 to Port 21h (main slice) or a1h (from the slice).The order of the 4 steps is not reversed.The ICW format is as followsInit8259a:moval, 011hout020h, AL; Lord 8259, Icw1.callio_delayout0a0h, AL; From 8259, Icw1.callio_delaymoval, 020h; IRQ0 corresponding interrupt vector 0x20out021h,
A dynamic Array (ArrayList) represents a collection of objects that can be individually indexed.Dynamic arrays can be resized automatically.Allow dynamic memory allocation, how to add, search, sort.using system;using System.collections;namespace collectionapplication{class program {static void Main (string[] args) {ArrayList Al = new ArrayList (); Console.WriteLine ("Adding Some numbers:"); A
MOVW $0X55AA,%BX
int $0x13
2.2. function 0x42
Reads data to memory from a specified sector
%DL can be obtained from the functional 0x41, which is the device number, and the disk is 0x80
%ds:%si is the specified memory address
2.3. function 0x8
Getting disk parameters
2.4. function 0x2
Reads the specified sector data to memory
%al is the number of sectors
%ch is a cylindrical number.
%CL is a sector area code, 6th, 7 is the high level of the cylinder
Modifyfile,pmapaddr; Modify memory block contentsInvoke unmapviewoffile,pmapaddr; unlock file mappings. endifInvoke Closehandle,hmap; Close memory-mapped file. endifInvoke CloseHandle, hfile; Close file. endifRetWinMain ENDP; Get the file name to process; Return: If eax=null indicates that no file name is provided for processing; otherwise eax point to the filename addressGetFileName ProcInvoke Getfilenamefromcommandline,addr FileName. If Eax==nullCall Getfilenamefromdialog. endifRetGetFileName
month/day in different foldersPath + = DateTime.Now.ToString ("yyyymm") + "/" + DateTime.Now.ToString ("DD");Break}Return path + "/";}Do you need water marks?private bool Iswatermark (string _fileext){Determine if the watermark is turned onif (Watermarktype > 0){The type of picture that determines whether a watermark can be struckArrayList al = new ArrayList ();Al. ADD ("BMP");
to write it by mathematical induction) and get a column of Orthogonal Arrays $ P_2, \ cdots, p_n $ makes $ P = P_1P_2 \ cdots P_n $ A $ \ Bex P ^ tap = \ sex {\ BA {CCC} \ lm_1 *\\ \ ddots \\ \ lm_n \ EA }. \ EEx $ re-certificate question: by $ P, A $ orthogonal knowledge $ \ DPS {\ sex {\ BA {CCC} \ lm_1 * \\ \ ddots \\\ \ lm_n \ EA }}$ also orthogonal. however, the actual feature value of $ \ lm_ I $ is $ A $ and can only be $ \ pm 1 $. note that each column of the orthogonal array is a uni
1. Simple Man-Machine Interaction
Stacka segment
DB 100 DUP (?)
Stacka ends
Data Segment
Mess1 dB 'What is your name? ',' $'
Mess2 dB 'How old are you? ',' $'
Buf1 dB 20
DB?
DB 20 DUP (?)
Buf2 dB 15
DB?
DB 15 DUP (?)
Data ends
Code segment
Assume Cs: code, DS: data, SS: stacka
Main proc far
Start: PUSH DS
MoV ax, 0
PUSH AX
MoV ax, Data
MoV ds, ax
MoV dx, offset mess1
MoV ah, 9
Int 21 h
MoV dx, offset buf1
MoV ah, 0ah
Int 21 h
MoV dx, offset mess2
MoV ah, 9
Int 21 h
MoV dx, offset buf2
MoV a
Deque basic operationsI. Prototype And ConstructorTypedef deque ConstructorDeque ();Deque (Al );Deque (N );Deque (n, x );Deque (n, x, Al );Deque (first, last );Deque (first, last, Al );Ii. Operations1. Resize clearUse resize (n) to change the size, and use resize (n, Val) to fill the idle value with T (VAL.2. Clear operationIt is a good habit to call deqobj. Swa
to say, you want to tell the hard disk controller which sector under which head of the hard disk is to be read, and then issue the READ command. The hard disk controller caches the content of the sector, then, the 16-bit data is put into a register (1f0h) in sequence, and the CPU can read the data through the IO command.
Let's look at another sample code:
MoV dx, 1f6h; disk number and head number to be readMoV Al, 0a0h; disk 0, head 0Out dx,
18. String processingThe preceding article describes the processing of strings, which are arrays of type Byte, and now implement a piece of code to copy the string string1 data into the string string2The code is as follows" Hello world! " 0 0 . Codemov-mov ebx,0. Repeatmov al, String1[ebx]mov string2[ebx], AlInc Ebx.untilcxzby ecx Decrement, the string string1 each character at once to string2, where the EBX base register is used. can also be pas
.libIncludelib User32.libIncludelib Masm32.lib. DataSzcaption db "GetCommandLine", 0. Data?FileName DB 256 dup (?). CodeGetfilenamefromcommandline proto:lpstr; Used to store the processed file nameStartInvoke Getfilenamefromcommandline,addr FileName. If Eax!=nullInvoke Messagebox,null,eax,addr SZCAPTION,MB_OK. endifInvoke Exitprocess,null; If eax=null indicates that the processed file cannot be extracted from the command line; otherwise eax point to the filename addressgetfilenamefromcommandline
This program aims to display all the sorting results of the array, the algorithm.
Import java. util. arraylist;Import java. util. calendar;Import java. util. collections;Import java. util. List;
Public class range {Private Static int COUNT = 0;
// Number of cyclesPrivate Static int looptime = 0;
// The container that saves the resultPrivate Static arraylist ls = new arraylist ();Public static void main (string [] ARGs ){
Long L1 = calendar. getinstance (). gettimeinmillis ();Integer [] result =
As the title says, this is a bug manufacturing expert. The program is not only a simple, ugly program, but also a bug.
assume cs:code,ss:stack,ds:datastack segment db 64 dup (0)stack endsdata segment data endscode segment show_arr:cli mov ax,0b800h mov es,ax mov bx,0 mov cx,4000 mov ax,0000001000000000b s: mov es:[bx],ax inc bx inc bx loop s mov b
different foldersPath + = DateTime.Now.ToString ("yyyymm") + "/" + DateTime.Now.ToString ("DD");Break}Return path + "/";}Do you need water marks?private bool Iswatermark (string _fileext){Determine if the watermark is turned onif (Watermarktype > 0){The type of picture that determines whether a watermark can be struckArrayList al = new ArrayList ();Al. ADD ("BMP");Al
Tags: ollydbg disassemblyollydbg using notes (10)ReferenceBook: "Encryption and decryption"Video: Small Turtle decryption Series videoExample program: http://pan.baidu.com/s/1kT1ce83
This program can start with "unregistered" in the title bar, find all reference text strings, search "unregistered"
You can find this code:
004046DD nop004046de nop004046df nop004046e0/$ 8a4424 m Ov al, byte ptr [esp+4]004046e4 |. 84c0 Test
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.