Today, three Chinese programming suddenly emerge, Wan Tai Sin Sina is also a blog, first expressing congratulations million Daisen last forever, the United States ages famous, recently was pointed million Tai Sin is the know whether, but also look informed. BS then continue to criticize.
because the other morning to go out and do something, starting one, another two million Daisen criticism that made the evening. first look at the official Chinese programming Sina blog post on !
IMC to the DPRK who is not What is your company, but also what enthusiastic users.
reserved Address:
anti-Han editors whine: > mm wrote in the field of Chinese programming to gradually extend the time to civilian
my online search, I like 2003, when there is an against the trend of Chinese language programming, and later do not know how to quiet down. < br> (at the beginning of a large section omitted here has nothing to do with the technology of the Round is: viruses; the third round is: Trojan hidden. But so far, no opponent can react! does have a few myself Luobing Cu, from the other side, arching the small steps, but only to the arch the river, no longer the more the utmost limit. because they have met my rounds:
original post
Chinese programming (Shen language) is a set and the system, hardware-independent system. it is entirely developed by us, using the unique structure of language and virtual machine, making any use of Chinese language program system database design language designed for database development environment with data and information management are a high degree of security, stability, security features. As the existing operating system and a completely different operating systems and software, resulting in fundamental blocking the spread of computer viruses and hacking . greatly increase the security of the system. As the independent development of products from bare metal, you can put an end to Chinese operating system, programming system by the back door, logic bombs, Trojan horses and other traps of. using Chinese programming, but also to prevent the door from the principle, logic bombs, Trojan production. especially in the network data transmission security, Chinese programming from the trenches, using a unique encryption protocol to prevent leakage. Therefore, Chinese programming to meet the excellent security in government, military, and enterprise application.
Emblem Sword Review:
1) system, since with the (estimated to be operating) system, hardware-independent, then your computer is running now doing?
2) how the software running on the windows platform, ah?
3) ah?
emblem recognized the sword from this text, the so-called come out come out to launch a general offensive to me!
first round is: to provide a source crack
I do out of our , or ten years, different or longer, can ; executable program,
Otherwise, we win, you fail.
emblem sword too lazy to comment on this User comments:
; interpretation code. It can parse the program in any language other procedures to achieve the same function, of course, restore to ;
when the first round, and determine the winner after the contest had just started the second round.
the second round is: I have a virus
we do out of as long as you time in three years, or five years, or ten years, different or longer, can The purpose of destruction, as long as a run this and not only win you a man, gang win, but all you English programming, win!
Otherwise, we win, you fail.
emblem sword too lazy evaluation, which is User comments:
or continue the process or thread running state does not release system resources, this has nothing to do with the language. but determined by the computer hardware and software systems, determine the winner after the contest had just started the third round.
the third round is: I have a Trojan hidden
we do out of five years, or ten years, different or longer, can to make this programming of all, win!
Otherwise, we win, you fail.
emblem sword too lazy to comment on this User comments:
Second, the same code or prohibited access to similar resources. as long as the listener can easily change the memory to write the program for a particular horse. even if this procedure is to use the system to obtain resources for API, then even the need to monitor the program, only Let Trojan listen to a particular event to the system API calls to get information. This is nothing to do with the language, do not understand your language in the implementation of the mechanism, if you do not jump out of a binary implementation of this framework, then do not speak your language is the most secure, because security is not a language problem, but programming problem. br> East is also known not break? , first to see how they move the pace of the arch.
first is to do the comparison of the two languages of the two procedures, the word results!, for example, that the is Do not eat it? it really should eat? we should understand that . But the point is that his technical ability, can only be replaced by the words, there is no ability to verify what the two different processing methods, there is no ability to determine that it is Look out, is really dead pig is not afraid to open Shui Tang
Here is a few daffodils Thesaurus comparison, the two systems of the two thesaurus, the version number of the interface and how much, and functional strength, and so the comparison. first version of the same level of comparison, he loses, he used a later version, and to compared with lower version, still does not account for what is cheap. With the release of our new version of our lexicon, new words will have more expansion, such as animation design language words, database design language words and so numerous. Last week, opponents challenge to us in Chinese programming, to be a mortal, point of view, the results, I think, has reached 90 points or more, short of the sort, no marks. Also, according to Challenger additional requirement that is ;, and our to very general. and anti-over to see opponents, that is, including the Challenger, including all the opponents, are not identified with their the thesaurus, poor vocabulary ah! words simply do not have the animation, do not have the animated feature! Therefore, the pawns, step arch to the river, can no longer forward.
Emblem Sword Review:
1) ; Hon Code is FREEBSD's.
later, is a juggle, and what the title replacement, replace any icon, what file name replaced, what folder replacement, tricks a lot, even to the Patent Office patent search site, to the Inland Revenue Department website check the tax, even to the company's Web site compiled Han, Q group, the aggressive pursuit latency, tapping vigorously, vigorously pursued thoroughly, and vigorously investigated, big fat chat, to check who is Joe Smith, who is John Doe, who was Wang Mazi , ha ha. However, these woven Luobing Cu, are all Why do not you refute one by one?
second look at how they whine for.
they use, tools, 削尖了脑袋, to get to the bottom, but they disappointed, these anti-Chinese and editors, all in the mouth, in the heart, uttered a sound, a sad obsessed choke whine: less than a thread, the thread gone? thread, how can monitor the thread? They can not monitor the thread, how our system can constitute a threat? them into our system, not threat enough, how can we peeled off my hair ; it? No wonder they series of these anti-Han people. have the ability, and put the track into the thread to the thread monitoring, send a screenshot, sent to the beat you, and you Oh!
ha ha! then laugh again! die of shame you, mad at you!
Emblem Sword Review:
this is also something that can not understand the computer proof of evidence million Daisen .
a program at least one process, a process that at least one thread. process is an independent function with a certain program on a data collection activities on the first run, is the system resource allocation and scheduling of a separate unit. thread is the process of an entity, is the CPU scheduling and distribution of the basic unit, which is smaller than the process, the basic unit can operate independently. thread basically do not have their own system resources, has only one point in the operation of essential resources, But it can belong to other threads of a process share the process with all the resources.
processes, threads, memory management is a core basic services, but also a major part of the kernel.
then we to see the Replies Daisen million when several Tracking the health of his house? you how to monitor the implementation of his specific situation? just found a system is running, that for you, what significance it? I do not see it? Wong Tai Sin had said:
The term of this statement. this in the program is executed, which appears, only one thread can be ignored. It is not within the scope of our consideration. For you, too, even if you see This process, implementation of this so-called a result of it! applications, widely used in military and business, too? you can not, be prepared Han, Wan Tai Sin can, is the latest technology In the multi-core or multi CPU environment is how the full use of resources. hh executable file, then run, the thread is tracking? microcomputer application, what happened the times? ago microcontroller, now no more machine? Do you not capable of, you do not have tools, I do nothing, but also to find any reason? ; first heard more than a machine.
2, on the DLL: software operating efficiency. do not understand anything the nerve to come up nonsense. thicker, but the Chinese language programming and Wan Tai Sin read the comments, really is strange enough ah. These days, people no sense of shame, ah invincible. I million Chinese language programming and the admiration of Daisen, such as the Yangtze River water only said, ah,
No comments:
Post a Comment