Source Code Online Home Categories Top Code New Code Submit Code
Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
DTM Data Generator for JSON 1.00.01
ApPHP WebsiteCleaner 1.0.2
Faxmind Server 5.1.1.0829
DecryptSQL 3.7.0
Fax Server Pro 9.0.0827
dbForge Fusion for Oracle 3.6
Code Line Counter Pro - Delphi Version 6.0
QPack Free Requirements Management Tool 7.0
dbForge Fusion for SQL Server 1.8
dbForge Fusion for MySQL 6.2
Cart2Cart: CRE Loaded to WooCommerce Migration 1.x
Hex Comparison 5.11740
Code Line Counter Pro - COBOL Version 6.0
7 Steps To Appointment Calendar In ASP.NET MVC5 1.0
Online Car Rental Management Software Solution Alpha
Top Code
DTM Data Generator for JSON 1.00.01
OpenWire Studio Beta2
SignalLab VC++ 5.0.3
PlotLab VC++ 5.0.3
InstrumentLab VC++ 5.0.3
BasicVideo VC++ 5.0.3
Contest Software - Agriya v2.0b2
AudioLab VC++ 5.0.3
VideoLab .NET 6.0
SignalLab .NET 6.0
PlotLab .NET 6.0
IntelligenceLab .NET 6.0
InstrumentLab .NET 6.0
BasicVideo.NET 6.0
LogicLab VCL 7.0
Top Search
Source Code Of Add Comment In Php
Get Ip Address From Url
Photo Add Comment Php
Free Source Code For Bulletin Board In Java
Add Comment Script
Board Games
Source Code For Chess Board Game In C Language
Chess Board Games
Source Code For Chess Board In Php
Php Code For Shopping Cart Payment
Php Flatfile Gallery
Carpooling Website Php
Final Year Computer Science Projects
Code For Online Shopping Portal Using Php
Codes For Online Grades Inquiry Using Html
Related Search
Sudden Attack All Cash
Sudden Attack Cash Encoder
Bug De Cash Pro Sudden Attack
Sudden Attack Cash Ciode
Sudden Attack Cash Non Stop
Sudden Attack Bug
Sudden Attack
Wall Sudden Attack
Sudden Attack Cheats
Sudden Attack Codes
Sudden Attack Cheats Codes
Cheat Codes For Sudden Attack
Sudden Attack Hs Aimbot
Sudden Attack Aimbot
Sudden Attack Wall Ahck
 Sudden Attack Hack Cash 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  



Nimda Attack Log P Linux compatible. Takes any clf(common log format) or similar log file and parses it for nimda requests from an infected computer. With this info., it creates a webpage seperating the requests by monthly totals. Page is easily configured with commented variables. Great for server admins.



It is tutorial investigation of annihilation of cardiac rhythm of new block library simulink ,Block Heart VI1,by changing sinus parameters and inducing annihilation of cardiac rhythm,meaning that sudden death can be caused by electrical party.



Processing center allowing cash accepting POS terminals to clear the payments with the service providers. Typically in kiosk scenarios allowing the customers to pay mobile phone recharges and communal charges.



AttackTreeMonkey is an XSLT script that calculates values in an attack tree (using Libxslt or Saxon) and outputs XHTML. Attack trees are a way of modelling security systems and how they fail (see Bruce Schneier in Dr Dobbs Journal; 1999).



Cash Bar Script is a professional custom "Get Paid To Surf" and "Get Paid To Receive Email" site. Most of you already know how these sites work. Members download a 'banner bar' that displays advertisements on their computer....



Our cash randomizer is a great money generating site that is Multi-Level-Marketing based.
This MLM site requires members to join after they pay other members and the admin based on a three tier system.

Upon receipt of all...



This is a hack to get around the read-only nature of __closure__ on function objects. Watch your step!



Does not require multiprocessing, easy to hack, maybe not optimal but did the job for a make like tool I wrote.



I'm a hack programmer -- no formal education. So, I don't know if this is technically a "factory", "abstract factory" or something else.

It is a way to generate a class dynamically, perhaps based on run-time...



This is a quick-hack module I wrote up in a couple of hours that allows for a nicer syntax to build up struct-like binary packing and unpacking. The point was to get it to be concise and as C-like as possible. This script requires python3 for it's...



This useless hack allows normal functions to be attached to a 'ThunkSpace' which causes the function to be lazily evaluated when the thunk is referenced. It is just a experiment using closures and descriptors to try and change python function call...



this is a hack to get the "foo" module that's outside a package whithin a file of the package, when it also contains a module named "foo" (ie relative imports)



This hack allows you to add a cookie/header to a SOAPpy request. It uses a keyword args all-through to pass your own transports down to the SOAPpy core. It uses the ClientCookie module to store the cookies generated and/or to send the cookies.



Just a little bit of hack: a linear equations solver using eval and built-in complex numbers:

>>> solve("x - 2*x + 5*x - 46*(235-24) = x + 2")
3236.0



Hack a class's __init__ method without subclassing the class
because a) you can't modify the original class and b) you can't modify other
classes already using the first class. This is a gross hack that should only
be used to work...



A hack to quickly replace multiple
characters/strings in a string with
characters from another string.



COCLICO Petits commerces, cash register machine software (POS software) for small retail businesses and shops. COCLICO Petits commerces can manage numerous counters using a web based network architecture. Based on Open Source softwares (Apache,...



This is a javascript hack for the TinyMCE WYSIWYG text editor to support CSS classes and ids

Users can use this script and modify their TinyMCE editor to support CSS classes and ids in their RTE editor.

A bar will be added to...



This function uses frequency analysis to attack and decode messages
encoded using a /substitution cipher/ which exchanges each letter of the
alphabet for another. Unlike the famous "Caesar Shift" cipher, which



This mfile simulates the outcome of an attack in the risk game. The number of attackers and defenders may be specified by the user.