Tutorials to .com

Tutorials to .com » Dotnet » Winform » .Net Windows development

.Net Windows development Articles


221: When you have an easy use of the hammer
Can not remember where to read this sentence, "When you have an easy use of the hammer, they will think that the world is a nail." Everything, all the problems, you try to use the hammer to solve the problem. In many cases, often, which th...

222: Process into a thread to execute code 2
http://www.security.org.sg/code/loadexe.html Code: //******************************************************************************************************* // loadEXE.cpp : Defines the entry point for the console application. // // Proof-Of-Conce...

223: AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept)
by Tan Chew Keong 15 April 2004 Download Introduction API hooking is a useful technique that can be used to monitor API calls used by Win32 programs. This allows understanding of the programs''''functionalities based on the APIs ...

224: Regular expressions to explain all the symbols
Characters Description \ The next character will be marked as a special character, or the original meaning of a character, or a backward reference, or an octal escape character. For example, matching ,'''' n''''cha...

225: Windows Debuggers: Part 1: A WinDbg Tutorial
Table of contents Introduction Overview of Debuggers Comparison of Debuggers WinDbg PDB files Debugging Scenarios Remote Debugging Just-in-time Debugging 64-bit Debugging Managed Debugging Debugging Services Debugging Exceptions WinDbg ...

226: Network packets to intercept General Technology
Network packets to intercept General Technology Author:-ping (gjp) See a lot of man to provide the technology to intercept packets, which is the most prepared in the IM DRIVER on NDIS intermediate layer MINIPORT (NIC drivers), and between the proto...

227: On. Net models of design articles - collected from CSDN
The traditional mode of production more and more difficult to meet the rapid demand growth in the software. Improve software productivity, software production model must be studied. This article on the current software of the new mode of production ...

228: Penetrate the firewall, a new data transmission technology
The use of the technical background: Backdoor placed in the target host needs to be out of data transmission, data is very important at the same time, action can not be too much. Otherwise "serious" is not recommended to use the technolog...

229: wap (Wireless Application Protocol) portal deployment set up to collect and collate a lot of information
Organize a number of knowledge points wap portal, wap sites to collect a number of learning materials (A) add a MIME mapping, the type of document registration WAP page How to IIS (Microsoft Internet Information Server) to create WAP site 1. In I...

230: Automatic code generator LTP.Net update V1.9.1
1. Update the basis of the data access type 2. Data layer approach based on the parameters. To generate data layers can be free to choose: Based on the SQL statement, based on the parameters, based on the stored procedure 3. The database tree, tab...

231: using (XX xx = ...) the meaning of
Subject: When using with Author: overmind (overmind) Rating: Credit value: 96 Their communities: . NET technology. NET Framework The problem points: 20 Reply number: 3 Time: 2005-12-28 15:25:07 public AccountInfo SignIn (string userId...

232: Easy to prepare your own tractor algorithm, Algorithm to World War II
Tractor games are a widespread game of tractors, also known in some areas to upgrade or dual-pull (also some people say that is different from upgrading and tractors), a tractor in the basic rules of the game change, the main interest is to increase...

233: Sixth class add to the order parameter (translation)
This document by Li Wei (nirvana_li) translation from http://www.csharp-station.com/, reprint of the source, please note! Updated 2006-2-14 Lesson 06: Adding Parameters to Commands Lesson No. 6: add parameters to the command This lesson shows yo...

234: Section VII of the use of stored procedures (translation)
This document by Li Wei (nirvana_li) translation from http://www.csharp-station.com/, reprint of the source, please note! Updated 2006-2-14 Lesson 07: Using Stored Procedures Division No. 7, the use of stored procedures This lesson shows how to ...

235: Operation of the Windows kernel space of some description
Author: ZwelL http://www.donews.net/zwell First of all I have been misleading people say I am sorry to say. I made at the Forum in the article posted (user-state generic version of the hidden process) is really a mess (-_-I am also a victim). In X...

236: Made a section of the code to open camera
Original: http://www.donews.net/zwell/archive/2004/09/24/108219.aspx //------------------------------------------------ --------------------------- / / Author: ZwelL / / Http://www.donews.net/zwell/ //--------------------------------------------...

237: HOW TO: WMI Quick Search
Author: Water cigarettes WMI query in the day-to-day management of computers and networks are often used. The purpose of this project is to make some simple WMI query. Functions: the identity of a given query WMI on one machine to provide the info...

238: Microsoft MSN detailed history of the development (1995-2001)
Microsoft MSN detailed history of the development of August 24, 1995 U.S. MSN formally opened online services network. March 25, 1996 the United States to use MSN dial-up Internet access exceeded one million users. June 15, 1996 MSNBC, an NBC (t...

239: About the characteristics of SOA and Web services to expand prospects
What is service-oriented architecture (SOA)? Service-oriented architecture (SOA) that you can how to use the Web services picture. Web services standardize the definition of the realization of services, as well as their interaction with the details...

240: Manual to install tomcat5 service into windows
Since the extract used to directly, and then copy the entire tomcat to the server, so the need for manual installation of the tomcat as windows services; Can be realized using the following script: rem rem NT Service Install / Uninstall script r...


Page 12 of 25
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]   [10]   [11]   [12]   [13]   [14]   [15]   [16]   [17]   [18]   [19]   [20]   [21]   [22]   [23]   [24]   [25]