[Java usage] detailed explanation of the usage of FileWriter, wirte() method and several overloaded methods

Contents of this article 1, Usage introduction 2, Question answer 2.1. What happens if this file does not exist? 2.2. What happens if this file exists? 2.3. If you don't want to overwrite the previous content, what should you do if you want to add content? 2.4. How to realize line feed when adding data? 3, Usage expansion 3.1. Overload ...

Added by plimpton on Sun, 19 Dec 2021 19:38:10 +0200

File general properties VS security properties

1. Overview of file properties Under Windows platform, the attributes of files are divided into general attributes and security attributes. When the user modifies the general attributes of the target file, the secret label obtains the general attributes of the file through GetFileAttributes(); Reset the general attributes of the original file ...

Added by floR on Tue, 14 Dec 2021 07:53:20 +0200

[obtain all file names in the specified directory]

1. Under linux environment 1.1 introduction to related functions In Linux environment, < dirent h> Is an application program interface, which is mainly used for directory reading operation of file system, and provides several directory data reading functions. Under Linux, all file name information can be obtained by traversing the fold ...

Added by trackz on Thu, 09 Dec 2021 13:13:36 +0200

Single machine Lianliankan crack

QQ Lianliankan stand-alone version: qqlk.exe Title: 1. Find the exe of the program itself 2. Remove the advertisement in the program 3. Write a QQ plug-in Tools used: OD PEID ImpREC VS2013 Test environment: Virtual machine win7 platform 32-bit 1. Initial interface &n ...

Added by biba028 on Tue, 07 Dec 2021 12:25:49 +0200

Software implementation method of process mutual exclusion

Principle of mutual exclusion of processes Idle admission: when the critical area is idle, a process should be allowed to access it. Wait when busy: when the critical area is being accessed, other processes trying to access need to wait. Limited waiting: to enter the critical area within a limited time, the packaging will not be hung ...

Added by Moocat on Sun, 05 Dec 2021 04:49:04 +0200

ApacheBench (ab) is used for interface pressure test and parameter result analysis under Windows environment

1, Purpose and content of this paper The main content of this paper is to build and use ab for interface pressure test and data analysis under windows environment for the first time 2, What is ab? Apache bench is a web stress testing tool provided with Apache server, abbreviated as ab. AB itself is a command-line tool with low local req ...

Added by andyg2 on Fri, 03 Dec 2021 09:14:18 +0200

Network Security Learning -- file sharing

Shared server Provide file sharing services through the network, and provide file download and upload Set up a shared folder on Win2003 Enter the win2003IP address in Win+R on the Win7 virtual machine Click OK and enter the user name and password. After successful verification, the shared folder will be displayed Permissions for shared fold ...

Added by hlstriker on Sat, 27 Nov 2021 06:33:36 +0200

Win32 API Menus and Controls

control Control concept Control: a special kind of "child" window, the system has defined the window type Create like create window, call CreateWindow, each control has its own ID When a control event occurs, a notification message is sent to the parent window where it is located SendMessage and PostMessage can be used to send messa ...

Added by dmcdivitt on Fri, 26 Nov 2021 19:23:59 +0200

windows Memory Management api learning notes

Why use virtual memory Virtual memory is best used to manage large objects or data structures. For example, in a spreadsheet program, there are many cells, but perhaps most cells have no data and do not need to allocate space. Perhaps, you will think of using dynamic linked list, but the access is not as fast as array. Defining a two-dime ...

Added by john9292 on Sun, 21 Nov 2021 13:02:58 +0200

Game memory modifier

Implementation principle Modifying the data displayed in the game is to modify the memory of the process where the game is located, because these data are retained in memory. Because the address spaces of processes are isolated from each other, API functions must be used to access the memory of other processes. The following two functions are ...

Added by KrisCons on Thu, 11 Nov 2021 12:36:59 +0200