Source: http://hi.baidu.com/ccsdu_xx/blog/item/f43628dfca127e1162279878.html
Set the followingCodeCopy and save the file as 1.txt, and place it on drive C,
Click Start and Enter cmd to enter the DOS interface,
Enter cd c :\
Then enter debug
PS: I only think of the following data: memory address and running data, called in batches
It's a 3D Game rotation interface, and there's a wonderful piece of music !!!
E100 33 F6 BF 0 20 B5 10 F3 A5 8C C8 5 0 2 50 68 13 1 CB e 1f be A1 1
programmers have strong or weak points.
Putting aside impetuousness, it is right to sink your mind to do things.
Source code of the appendix Program (I do not know it was written by the Senior Engineer ):
E100 33 F6 BF 0 20 B5 10 F3 A5 8C C8 5 0 2 50 68 13 1 CB e 1f be A1 1 BF 0 1E11b 6 57 B8 11 1 BB 21 13 89 7 4B 4B 48 79 F9 ad 86 E0 8B C8 bd ff E8 20E134 0 3D 0 1 74 1A 7f 3 aa eb F3 2D FF 0 50 E8 F 0 5A F7 D8 8B D8 26 8A 1 aaE14f 4A 75 F9 EB de CB 57 BB 21 13 8B C1 40 F7 27 F7 F5 8B FB Ba 11
Copy the following code and save it as a text document. Name it 1.
Use DEBUG
Generate an executable program.
It's a 3D Game rotation interface, and there's a wonderful piece of music !!!Go and have a look
E100 33 F6 BF 0 20 B5 10 F3 A5 8C C8 5 0 2 50 68 13 1 CB e 1f be A1 1 BF 0 1E11b 6 57 B8 11 1 BB 21 13 89 7 4B 4B 48 79 F9 ad 86 E0 8B C8 bd ff E8 20E134 0 3D 0 1 74 1A 7f 3 aa eb F3 2D FF 0 50 E8 F 0 5A F7 D8 8B D8 26 8A 1 aaE14f 4A 75 F9 EB de CB 57 BB 21 13 8B C1 40 F7 27 F7 F5 8B FB Ba 11
This is the world Hacker Programming competition first work (97 Mekka ' 4K intro competition), written in assembly language. The entire program is 4095 bytes long and generates a. com program with only 4 K, but it achieves the effect of 3D animation and a background music. The picture is a scene of the game spinning. Absolute cow.
1 Paste the following code into Notepad, save as a 1.txt document.
2 in the Command Line window (at the beginning → run →cmd), enter the document, enter the Debug
E10
Work Assignment DescriptionHT Company will build an FTP server. publish the FTP server with the IIS component that comes with Windows server server, with the following requirements:1, anonymous access to the FTP site;2. Create a folder named "ftp"in the C driveas the home directory of the FTP site. 3, the establishment of the isolation of the user's ftp . 1) set up Bob and John two users to access FTP,2)FTP using isolated user mode;3)Bob and John two users can only access their own folders after
write), as shown in the following figure
And I used the second way, but the indentation is the way to fill in the blanks, that is, the position of indentation with blank pictures to avoid the problem of Jquery.treeview
My tree node structure
We can write CSS by defining the HTML of the node. With the effect diagram, there is a node structure and then the CSS is written
Here is the complete code for CSS
Copy Code code as follows:
. ie. bbit-tree. bbit-tree-bwrap{
}
In this article, I'll delve into the most basic part of JavaScript-the execution context (execution). After reading this article, you should be aware of what the interpreter does, why the functions and variables can be used before the declaration, and how their values are determined.
1. ec-execution environment or execution context
Each time the controller arrives at the ECMAScript executable code, the controller enters an execution context (a very
Accidentally see an article on the Internet, speaking of the World Hacking programming contest first place a very cool program, size only 4KB, using the Debug command to run.The sad reminder is that win8.1 's debug command is not available.The error is as follows:Here's how to fix it:1. Download DOSBox and Debug.exe1:http://download.csdn.net/detail/ljgstudy/7557693 (PS: Need 1 points, many points of the Great God Mercy ha ~)2:http://pan.baidu.com/s/1iwkgy (free points)2. Install the DOSBox and s
There is an array, possibly multidimensional, with some values with special symbols such as "I escaped with recursion plus addslashes ()
It's not working, help, see what's wrong.
$arr =array (' II ', array (' one ' = ' "EC" ', ' =>5 '));
Function T ( $arr) {
foreach ($arr as $v) {
if (is_string ($v)) {
$arr []=addslashes ($v);
}else{
T ($v);
}
}
}
T ($arr);
echo "
"; Print_r ($arr); Echo '';
This is how the foreground page is exported.
_____
Using the recursive addslashes function to escape an array has an array, which may be multidimensional. some values contain special symbols, such as "I use recursion to add addslashes () escape
Failed to achieve the effect. help me see what's wrong.
$ Arr = array ('II "', array ('one' => 'EC"', 'two' => 5 ));
Function t ( $ arr ){
Foreach ($ arr as $ v ){
If (is_string ($ v )){
$ Arr [] = addslashes ($ v );
} Else {
T ($ v );
}
}
}
T ($ arr );
Echo"
This problem is easy to understand. However, if you think deeply, there are some things.Next I will try to extend this item to a bit more in-depth.I. There is only one standard!At the Assembly language level, when declaring variables, there is no difference between signed and unsignde. The assembler processes all the input integers as signed numbers into supplementary codes and saves them to the computer, only this standard is available! The assembler does not distinguish between signed and unsi
Work Assignment DescriptionHT Company will build an FTP server. publish the FTP server with the IIS component that comes with Windows server server, with the following requirements:1, anonymous access to the FTP site;2. Create a folder named "ftp"in the C driveas the home directory of the FTP site. 3, the establishment of the isolation of the user's ftp . 1) set up Bob and John two users to access FTP,2)FTP using isolated user mode;3)Bob and John two users can only access their own folders after
You do not know the execution context of JavaScript -- Item19 (execution context)
In this article, I will go into the execution context, the most basic part of JavaScript ). After reading this article, you should understand what the interpreter has done, why functions and variables can be used before declaration, and how their values are determined.1. EC-execution environment or execution Context
Whenever the Controller reaches the ECMAScript executab
-channel1
* Mar 1 00:05:31. 643: % EC-5-BUNDLE: interface fa1/14 joined port-channel PO1
* Mar 1 00:05:31. 715: % EC-5-BUNDLE: interface fa1/15 joined port-channel PO1
R1 (config-if-range) # ex
* Mar 1 00:05:34. 591: % LINEPROTO-5-UPDOWN: Line protocol on interface Port-channel1, changed state to up
R1 (config) # int port-Channel 1
R1 (config-If) # Switch the switchport mode to the trunk Port
R1 (config-If)
Pay attention to the risks of this software. Do not try it for cainiao !!!!V14 and V12 modified the following bugs. Unfortunately, they still do not support SATA and SAS hard disks?1. Non-Russian. Optional. English.2. More than GB hard disk recognition is added.3. provide hard disk repair speed.
I. Introduction to pc3000PC-3000 is a commercial professional hard drive repair integrated tool developed by Ace laboratory, a famous Russian hard drive laboratory. It manages the hard disk from the inte
The customer sent a piece of Seagate st380011a hard disk for data recovery. The fault is that the disk is not recognized or knocked on the disk. Next we will follow the data recovery senior engineers to learn how to repair the data while protecting the data.
We will analyze it in several steps, and we will detect the failure of the hard disk.
First, check the hard disk appearance and circuit board.
First front of the hard disk sticker:
Fi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.