Home> Network programming tutorial
All ASP tutorial ASP tutorial ASP.NET tutorial PHP tutorial JSP tutorial C#/CSHARP tutorial XML tutorial Ajax tutorial Perl tutorial Shell tutorial Visual Basic tutorial Delphi tutorial Mobile development tutorial C/C++ tutorial Java tutorial J2EE/J2ME Software engineering
Network programming tutorial
  • delphi reads ini file

    delphi reads ini file

    INI files play a very important role in system configuration and application parameter saving and setting. Therefore, the visual programming family, such as VB, VC, VFP, Delphi, etc., provide methods for reading and writing INI files. Among them, INI is o
    2025-02-13
  • Sending SMS (Mobile Short Message Service) using Delphi

    Sending SMS (Mobile Short Message Service) using Delphi

    Sending SMS (Mobile Short Message Service) using Delphi The following example demonstrates how to call an SMS WEB service through SOAP. First download and install Microsoft SOAP Toolkit 2.0 through the following address: http://msdn.microsoft.com/download
    2025-02-13
  • Example analysis of usage examples of Tree and scroll bars in swing

    Example analysis of usage examples of Tree and scroll bars in swing

    This article describes the usage of Tree and scroll bars in swing. Share it for everyone for your reference. The details are as follows: import java.awt.*;import java.awt.event.*;import javax.swing.*;import javax.swin
    2025-02-13
  • Delphi message processing

    Delphi message processing

    Delphi is an object-oriented visual software development tool from Borland Company. Delphi combines the advantages of both Visual C++ and Visual Basic: easy to use, powerful, and has unique advantages especially in interface design, database programming,
    2025-02-13
  • Delphi database programming tutorial (6)

    Delphi database programming tutorial (6)

    Section 4: Finding the Beginning of JPEG in BLOB OLE object type format - take three! Now all we need to do is store the image to disk (as an ordinary binary file) and understand it What is the content of the door. All image files
    2025-02-13
  • Detailed explanation

    Detailed explanation

    The hash table is also known as the distribution list, which is a collection class structure used to store group objects. What is the hash table array and vector can store the object, but the storage location of the object is random, that is, there is no
    2025-02-13
  • Java lock blocking lock introduction and code examples

    Java lock blocking lock introduction and code examples

    As a tool for concurrently sharing data and ensuring consistency, locks have multiple implementations on the JAVA platform (such as synchronized and ReentrantLock, etc.). These already written locks provide convenience for our development, but the specifi
    2025-02-13
  • Use redim and preserve to create dynamic array instances in asp

    Use redim and preserve to create dynamic array instances in asp

    This article mainly introduces the use of redim and preserve in asp to create dynamic array instances. This article also gives examples of other array operations in ASP. Friends in need can refer to the function of REDIM in asp to dynamically define the a
    2025-02-13
  • ASP+ Chinese Tutorial (2) ---- ASP+ Web Forms

    ASP+ Chinese Tutorial (2) ---- ASP+ Web Forms

    China's largest web development resource website and technology community, ASP + Web Forms, a new term of Microsoft, as its own words, the ASP + Web Forms page framework Web page. Don’t you understand it, is it? Actually
    2025-02-13
  • String.indexOf method introduction

    String.indexOf method introduction

    The IndexOf() method of a string searches whether the string passed as a parameter appears on the string. If the string is found, it returns the starting position of the character (0 means the first character, 1 means the second character follows By analo
    2025-02-13
  • Summary of nine methods to prevent MDB database from being downloaded

    Summary of nine methods to prevent MDB database from being downloaded

    It turns out that changing mdb to asp can prevent downloading is nonsense. Use Flashget to test download the data.asp file and save it as a data.mdb file. I found that it is intact when opened with ACCESS! 1. Use your imagination to modify the database fi
    2025-02-13
  • Java uses Jdom to read xml parsing instances

    Java uses Jdom to read xml parsing instances

    This article describes the use of Jdom to read XML parsing in Java. I will share it with you for your reference, the details are as follows: package com.yanek.demo.xml.test;import java.io.File;import java.io.IOException;
    2025-02-13
  • Two ways to hide the ASP Trojan backdoor

    Two ways to hide the ASP Trojan backdoor

    The following two methods can hide your ASP Trojan. You can test it. 1. Create a non-standard directory: mkdir images../Copy the ASP Trojan to the directory: copy c:/inetpub/wwwroot/dbm6.asp c:/inetpub /wwwroot/image
    2025-02-13
  • Java implements a violent algorithm for the algorithm problem of continuous odd numbers (n+2*x) being composite numbers

    Java implements a violent algorithm for the algorithm problem of continuous odd numbers (n+2*x) being composite numbers

    Six consecutive odd numbers a, a+2, a+4, a+6, a+8, a+10 are all composite numbers. Find the brute force solution for the smallest a. Upload the results first, then paste the code: 1 consecutive n=9, number of consecutive values: 1; time consuming: 0ms, to
    2025-02-13
  • ASP has the usage of Global.asa file

    ASP has the usage of Global.asa file

    First of all, .asa is the file suffix, which is the abbreviation of Active Server Application. The Global.asa file can manage two very demanding objects in ASP applications: Application and Session. It is actually an optional file in which the programmer
    2025-02-13