Description: C language of the Chinese hackers part of the virus code can be well understood "three threads" programming, insert the threaded technology. Platform: |
Size: 12966 |
Author:wdb |
Hits:
Description: from the database to a data code ah then? Comfort conversation at that time not only as the only girl Though flu if we can then recognize sudden meeting Platform: |
Size: 4257 |
Author:淦海涛 |
Hits:
Description: producers and consumers, a total of 12 buffer pool, the production and consumption of time can be set itself Platform: |
Size: 9758 |
Author:林一森 |
Hits:
Description: N-scheduling process, the interface and the process is pretty good, and is worth the download Platform: |
Size: 27747 |
Author:林一森 |
Hits:
Description: transparent button button based on the realization of different backgrounds to show the same time transparent button on the icon can be loaded Platform: |
Size: 160435 |
Author:曼 |
Hits:
Description: Linux operating system simulation, user name and password you are the machine user name and password Platform: |
Size: 633623 |
Author:林一森 |
Hits:
Description: process of scheduling problems, priority scheduling algorithm method and the time-wheel, speed regulation can create Platform: |
Size: 27675 |
Author:林一森 |
Hits: