File Operations (2): file shredder, file operation file shredder
Principle of file shredder: Before a file is deleted, write it with random characters
(Note: The reference material uses the BCB compiler, but the BCB compiler does not. Therefore, we need to use MFC here)
I,
First, create a dialog box-based MFC project and add controls in the dialog box
M_StatusBar
Rising file Shredder Green Simplified Chinese Special Edition _ Support File/folder drag, rising file Shredder applet, which can again choose whether to clear these files. And this program can be run alone, supporting files, folders drag and drop, clear System folder will have related prompts
The main function of file smashing is for some stubborn virus, sometimes some virus files are protected and cannot b
Endurer note: File crushing program. I used to use Turbo C 2.0 to write a command line program running in DOS. The file length seems to be more than 9 KB. Later I used ASM to write the program, the file length is less than 700 bytes, that is,
Shredder is implemented in the GUI window on Windows platform. It is really great to keep a slim figure of 9kb (the length of the EXE file is 40,960 bytes, And the ZIP file is 9,526 bytes after compression, I do
In the Android development, sometimes may want to use the paper shredder effect, today small arranges for everybody to tidy up the code, takes a look.
First look at the effect chart
Instance Code
Xml
Java
Mpapershredderview.setshrededtype (PaperShredderView.SHREDEDTYPE.Piece);//paper effect and note effect
Mpapershredderview.setsherderprogress (false);
Mpapershredderview.settitle ("purge data");
Mpapershreddervie
BAT version File shredder
Copy Code code as follows:
@echo off
For%%f in (% 1) do (
echo Deleting%%f ...
Copy nul%%f/y>nul
Del%%f/q/F
)
The above content is saved to C:\windows\system32\kill.bat.
Edit VBS script File
Copy Code code as follows:
Set Ws=createobject ("Wscript.Shell")
Ws.regwrite "hkcr\*\shell\\ Smash file \command\", "Kill%1"
After running the VBS file, a smash file item ap
One: Software download
You can go to www.http://duote.com/soft/13836.html to download software.
Second: Software Installation
Double-clicking the software will appear as shown in the following image of the software Installation interface, as long
Shredding Company
Time Limit: 1000MS
Memory Limit: 10000K
Total Submissions: 4397
Accepted: 2519
DescriptionYou are just been put in charge of developing a new shredder for the shredding company although a "normal" Shredder would Just shred sheets of paper into little pieces so then the contents would become unreadable, this new
Shredding CompanyTime Limit: 1000 MS Memory Limit: 10000 KTotal Submissions: 3138 Accepted: 1795 Description You have just been put in charge of developing a new shredder for the Shredding Company Although a "normal" shredder wocould just shred sheets of paper into little pieces so that the contents wocould become unreadable, this new shredder needs to have the f
Shredding Company
DescriptionYou have just been put in charge of developing a new shredder for the shredding company although a "normal" shredder wocould just shred sheets of paper into little pieces so that the contents wocould become unreadable, this new shredder needs to have the following unusual basic characteristics.1. The
Shredding Company
Time Limit: 1000MS
Memory Limit: 10000K
Total Submissions: 4595
Accepted: 2633
DescriptionYou are just been put in charge of developing a new shredder for the shredding company although a "normal" Shredder would Just shred sheets of paper into little pieces so then the contents would become unreadable, this new
DescriptionYou have just been put in charge of developing a new shredder for the shredding company although a "normal" shredder wocould just shred sheets of paper into little pieces so that the contents wocould become unreadable, this new shredder needs to have the following unusual basic characteristics.
1. The Shredder
Shredding CompanyTime limit:5000/2000 MS (java/others) Memory limit:65536/32768 K (java/others)Total submission (s): 445 Accepted Submission (s): 124Problem Descriptionyou has just been put in charge of developing a new shredder for the shredding company. Although a "normal" shredder would just shred sheets of paper to little pieces so that the contents would become Unreada BLE, this new
; "alt =" image "src =" http://image.mamicode.com/info/201411/20181006093557556314.png "border =" 0 "/>Top 5: overestimated results of only one marketing campaign
Research shows that marketing information needs to be exposed 6 times on average before users can take real actions. That is, we need to influence consumers through marketing multiple times to encourage consumers to continue to pay attention and purchase.
Let's take a look at this point through a personal example. One night, my wife an
Google adwords ). In these ways, there will probably be several views. This gives you a rough estimate of the target market. For example, how many visits are expected to become users? Will 10% of users buy your product? This will help you establish a more rational scenario speculation so that you can make more informed decisions. Top 5: overestimated results of only one marketing campaign Research shows that marketing information needs to be exposed 6 times on average before users ca
adwords ). In these ways, there will probably be several views. This gives you a rough estimate of the target market. For example, how many visits are expected to become users? Will 10% of users buy your product?
This will help you establish a more rational scenario speculation so that you can make more informed decisions.
Top 5: overestimated results of only one marketing campaign
Research shows that marketing information needs to be exposed 6 times on average before users can take real
The "Shredder" in the office is designed to shred paper files that have top secret content, and how to smash them completely if the computer's electronic files contain private content? Never count on the "delete" feature in Windows, so you know, files that are deleted can still be easily recovered with some tools. In this can use Jinshan poison pa One of the "file Smash" function, can definitely help you.
Open Jinshan Poison Overlord interface, first
Open Jinshan Poison Overlord interface, first click on the left side of the "Safe visionary" tab, and then click on the right "file Smash" function button. The "File Shredder" dialog box will be ejected to start the file smashing function of Jinshan poison PA 2011.
Here you can click the "Add File" or "Add Folder" button, import the file or folder you want to delete from the system, after the import and confirm that you want to crush the file,
glance.
If the information is not detailed enough, you can also click Settings. Select "Select column" In the Drop-down menu, check the relevant items in the pop-up window, let the Jinshan Process manager display more information; If you suspect that a risk process is running, click the "Find Risk Process" button and the system automatically scans the currently running process. By pulling out the risk process and selecting it, clicking the "End Selected process" button (Figure 1) will end the
, clicking the "End Selected process" button will end the risk process and ensure the system runs safely.
File Shredder: Completely delete the privacy file
Computers are more or less stored in private files, delete private files are fastidious, the conventional method to delete the file is not thorough, with the tool can easily recover, easy to create privacy leakage, do not even make a "xx door." Jinshan Poison pa "File
How can the Gold Mountain poison tyrant smash the document?
Related knowledge: Jinshan poison bully hot How to close?
Open Jinshan Poison Overlord interface, first click on the left side of the "Safe visionary" tab, and then click on the right "file Smash" function button. The "File Shredder" dialog box will be ejected to start the file smashing function of Jinshan poison PA 2011.
Here you can click the "Add File" or "Add Folder" button, import t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.