[Java usage] detailed explanation of the usage of FileWriter, wirte() method and several overloaded methods
Contents of this article
1, Usage introduction
2, Question answer
2.1. What happens if this file does not exist?
2.2. What happens if this file exists?
2.3. If you don't want to overwrite the previous content, what should you do if you want to add content?
2.4. How to realize line feed when adding data?
3, Usage expansion
3.1. Overload ...
Added by plimpton on Sun, 19 Dec 2021 19:38:10 +0200
File general properties VS security properties
1. Overview of file properties
Under Windows platform, the attributes of files are divided into general attributes and security attributes.
When the user modifies the general attributes of the target file, the secret label obtains the general attributes of the file through GetFileAttributes(); Reset the general attributes of the original file ...
Added by floR on Tue, 14 Dec 2021 07:53:20 +0200
[obtain all file names in the specified directory]
1. Under linux environment
1.1 introduction to related functions
In Linux environment, < dirent h> Is an application program interface, which is mainly used for directory reading operation of file system, and provides several directory data reading functions.
Under Linux, all file name information can be obtained by traversing the fold ...
Added by trackz on Thu, 09 Dec 2021 13:13:36 +0200
Single machine Lianliankan crack
QQ Lianliankan stand-alone version: qqlk.exe
Title:
1. Find the exe of the program itself
2. Remove the advertisement in the program
3. Write a QQ plug-in
Tools used:
OD
PEID
ImpREC
VS2013
Test environment:
Virtual machine win7 platform 32-bit
1. Initial interface
&n ...
Added by biba028 on Tue, 07 Dec 2021 12:25:49 +0200
Software implementation method of process mutual exclusion
Principle of mutual exclusion of processes
Idle admission: when the critical area is idle, a process should be allowed to access it.
Wait when busy: when the critical area is being accessed, other processes trying to access need to wait.
Limited waiting: to enter the critical area within a limited time, the packaging will not be hung ...
Added by Moocat on Sun, 05 Dec 2021 04:49:04 +0200
ApacheBench (ab) is used for interface pressure test and parameter result analysis under Windows environment
1, Purpose and content of this paper
The main content of this paper is to build and use ab for interface pressure test and data analysis under windows environment for the first time
2, What is ab?
Apache bench is a web stress testing tool provided with Apache server, abbreviated as ab. AB itself is a command-line tool with low local req ...
Added by andyg2 on Fri, 03 Dec 2021 09:14:18 +0200
Network Security Learning -- file sharing
Shared server
Provide file sharing services through the network, and provide file download and upload
Set up a shared folder on Win2003 Enter the win2003IP address in Win+R on the Win7 virtual machine Click OK and enter the user name and password. After successful verification, the shared folder will be displayed
Permissions for shared fold ...
Added by hlstriker on Sat, 27 Nov 2021 06:33:36 +0200
Win32 API Menus and Controls
control
Control concept
Control: a special kind of "child" window, the system has defined the window type Create like create window, call CreateWindow, each control has its own ID When a control event occurs, a notification message is sent to the parent window where it is located SendMessage and PostMessage can be used to send messa ...
Added by dmcdivitt on Fri, 26 Nov 2021 19:23:59 +0200
windows Memory Management api learning notes
Why use virtual memory
Virtual memory is best used to manage large objects or data structures.
For example, in a spreadsheet program, there are many cells, but perhaps most cells have no data and do not need to allocate space. Perhaps, you will think of using dynamic linked list, but the access is not as fast as array. Defining a two-dime ...
Added by john9292 on Sun, 21 Nov 2021 13:02:58 +0200
Game memory modifier
Implementation principle
Modifying the data displayed in the game is to modify the memory of the process where the game is located, because these data are retained in memory. Because the address spaces of processes are isolated from each other, API functions must be used to access the memory of other processes. The following two functions are ...
Added by KrisCons on Thu, 11 Nov 2021 12:36:59 +0200