Inline assembly in VC (1)

# Include int winapi winmain (hinstance, hinstance hprevinstance, lpstr lpcmdline, int nshowcmd) { tchar szname [] = text ("embedded assembly"); tchar szcontent [] = text ("Hello world! "); _ ASM { push mb_ OK Lea eax, szname // use Lea as

Vbs Study Notes

Just after FSO is parsed, I tried to write a script that writes TXT files to the system disk to create garbage. CodeFor reference only: Set FS = wscript. Createobject ("scripting. FileSystemObject ") Set fo = FS. getfolder ("C:/Windows/system32 ")

How to refresh the local DNS Cache

Windows will cache the DNS entries we have accessed for the next resolution of the domain name. We can add the validity period of the project's old control cache in the registry. HKEY_CURRENT_USER/software/Microsoft/Windows/CurrentVersion/Internet

Char to wchar_t and wchar_t to Char

# Include # include int _ tmain (INT argc, _ tchar * argv []) { wchar_t pwstr [] = l "I am a Chinese"; wchar_t pwstr2 [20]; char * pcstr = (char *) malloc (sizeof (char) * (2 * wcslen (pwstr) + 1); memset (pcstr, 0, 2 * wcslen (pwstr) + 1);

Window query API

xsl

Common window query Win32 API    Findwindow Function   TheFindwindowFunction retrieves a handle to the top-level window whose class name and window name match the specified strings. This function does not search child windows. This function does

Windbg viewing data (Elementary)

  DB/DW/DD/DQ address: View data in byte/word/Double/four-word mode o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> height:320.25pt'> o:title="" />   Da/du address: ASCII

Virtual current user

In many cases, registry operations are insecure. Therefore, registry operations are not used in many important scenarios. However, in many small cases, registry operations are convenient and effective. Registry operations of some content often

From Char/wchar_t to tchar)

I. ANSI and Unicode 1. Why Unicode? (1) It is easy to exchange data between different languages. (2) enable you to allocate a single. EXE file or DLL file that supports all languages. (3) improve the running efficiency of applications. Windows 2000

Creating a generic object Factory

From: http://www.gamedev.net/reference/programming/features/objectfactory/The Introduction Object factories are one of those extremely useful but often times overlooked constructs in programming. to put it simply, object factories are like virtual

Policy of uvnc in coping with Vista security mechanism (excerpt)

UltraVNC v1.03 beta tech infochanges The build in WinVNC service is replaced by an external service. Vista Require an isolation between the service and the desktop application.For security, applications started by a service, shocould by started as

WebDAV client Development Instance

(1) Environment Construction Source code must be obtained from--2.1-tomcat-5.0.28.zip, jakarta-slide-webdavclient-bin-2.1.zip, and Jakarta-slide -webdavclient-bin-2.1.zip. (2) configure the slide Server Decompress jakarta-slide-2.1-tomcat-5.0.28.zip

Open, save, and multi-choice dialog box implemented by MFC

Main Code: (m_edit1 and m_edit2 are the two cstring variables bound to the Edit Control, and m_list is the control variable bound to The ListBox) // Open the dialog box cfiledialog DLG (true); If (DLG. domodal () = idok) { This-> m_edit1 = DLG.

Exploration on security restrictions for ihtmldocument2 access through iwebbrowser2

Internet Explorer has many security restrictions by default, such as cross-framework cross-origin access to browser pages. For programmers, the common problem is that an access denial error is returned when iwebbrowser: get_document is called, And a

Search for the memory to obtain the QQ number

Let's take a seat and take a look. Handle getqqprocess (); bool seachqqnumber (handle _ hprocess, string & strqq); int _ tmain (INT argc, _ tchar * argv []) { handle hproces = getqqprocess (); If (hproces = NULL) cout string strqq;

Character Pointer Error-local pointer variable

Char * strcontent; bool fun (char * strcontent) { try { ....... } catch (_ com_err e) { ....... strcpy (strcontent, E. errormessage (); }} Trying to change the value of strcontent is not applicable here. E. errormessage () returns a local string.

How to read the HKEY_CURRENT_USER registry key of a specified user

The content under the HKEY_CURRENT_USER key in the registry belongs to the current user, so the content under the key is different when you log on with different users. However, sometimes we need to read the content under the specified user's key.

Multi-threaded Series 3 slim read/write lock

The difference between srwlock and the key segment is that it allows multiple threads to access protected resources in parallel, while modifying protected resources uses an exclusive access method. Assign a srwlock structure and initialize the

Use Excel to input data to sqlserver

1. First, ensure that a row is added to the first line of the Excel file to be entered. The specific content is the same as the fields in the database table. () 2. Use the SQL statement: Select *Table 6From OpenDataSource ('Microsoft. Jet. oledb.4.0

Learning notes-Readline

Today, I came across a function,Set readfile = FSO. opentextfile (where, 1)I = 0Do while I I = I + 1Strline = readfile. ReadlineLoopReadfile. CloseReadtxt = strlineAt first, I thought that Readline would append the content that was read when the

Multi-thread Series 6: Waiting For timer kernel objects

apc

Wait for the timer kernel object to be triggered after a time period or every time period. Use the following functions to create a wait timer object: HANDLE WINAPI CreateWaitableTimer( __in_opt LPSECURITY_ATTRIBUTES lpTimerAttributes, __in

Total Pages: 64722 1 .... 40871 40872 40873 40874 40875 .... 64722 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.