by: M.Fatih AKTAÇ |
last post by:
Hi,
How can i protect my source codes from resource hacker programs,
I find a program, I can build my project in VS.NET 2003 and this program
show all codes in my executable file,
Thanks
|
by: m++ |
last post by:
Hi there,
I am looking for some C++(object oriented) source codes of applications
designed for embedded systems. I am going to use them as benchmarks.
I've faced with some of these applications in...
|
by: Author Tarun Tyagi |
last post by:
Hi,
I am a Data Recovery Specialist and Professional Data Recovery
Software Developer in New Delhi.
I've placed the Complete SOURCE CODE of One of my Data Recovery
Software for Sale (for...
|
by: Enzo |
last post by:
Hi Ng,
It's possible to protect the source code of
a js file? With PHP?
Thanks in advance!
Enzo
|
by: Huihong |
last post by:
Please check out our source code search engine here, http://www.codase.com
e.g., search main method,...
|
by: Liang Chen |
last post by:
Is the file "bcopy.c" in the "libitery" directory the implement of the
GNU C library function "bcopy"? If so, how can it run so fast?(copy-by-byte
rather than copy-by-word) When I copy the code of...
|
by: Huihong |
last post by:
Please check out our newly released source code search engine here,
http://www.codase.com
e.g., search socket method call,...
|
by: Fady Anwar |
last post by:
Hi while browsing the net i noticed that there is sites publishing some
software that claim that it can decompile .net applications i didn't bleave
it in fact but after trying it i was surprised...
|
by: Huihong |
last post by:
Please check out our source code search engine here, http://www.codase.com
e.g., search the "main" method,...
|
by: Dave.Sun.Moon |
last post by:
Dear all,
I am not a professional programmer. In stead, I am using C++ mostly
for my research work. My knowledge of C++ is only good enough for my
computation. I really don't use the advanced...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|