设计并实现了PF_KEY第二版协议,该协议主要负责提供IKE与内核安全数据库进行通信的接口。
The author designs and realizes the second edition of PFKEY protocol, which is mainly responsible for providing the interface for communication between IKE and Kernal secure database.
最后在此基础上完成了一个基于内核入侵的木马设计与实现。
Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
重点设计并实现了PF_KEYV2协议,该协议主要负责提供IKE与内核安全数据库进行通信的接口。
The paper prominently designed and implemented the PF_KEY V2 protocol, which mainly provides the communication interface between IKE and SADB.
构件化操作系统设计的关键技术集中反映在其内核的设计与实现中。
For component based operating system, the key constructing techniques constrictively express themselves on the design and implementation of the kernel.
在书中涉及的高级主题是内存测试与验证、设备驱动程序设计与实现、实时操作系统内核、以及代码优化技术。
Among the advanced topics covered in the book are memory testing and verification, device driver design and implementation, real-time operating system internals, and code optimization techniques.
解决数据请求时占用内核时间过长问题的SD卡驱动软件设计与实现;
The SD card driver design resolves that the kernel is occupied too long by data request;
解决数据请求时占用内核时间过长问题的SD卡驱动软件设计与实现;
The SD card driver design resolves that the kernel is occupied too long by data request;
应用推荐