Numeric ActiveX components

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Numeric ActiveX components

This paper is concerned with the use of ActiveX components for numerical computations from within the Microsoft Windows environment. Detailed information is provided concerning the use of these components from Microsoft Excel, Microsoft Visual Basic, Microsoft Web browsers and Inprise Delphi. The examples in the paper are based on the following ActiveX components: a fast Fourier transform Activ...

متن کامل

Numeric Windows Components

One approach is to provide Dynamic Link Libraries (DLLs) which allow Mathematical software to be used from within Excel, Visual Basic, Visual C++, Visual Fortran etc. However, to call a DLL routine directly from Visual Basic requires detailed knowledge of both the routine’s arguments and also the manner in which they are passed to the Visual Basic calling program. It is therefore essential that...

متن کامل

Vulnerability Detection in ActiveX Controls

Vulnerabilities in ActiveX controls are frequently used by attackers to compromise systems using the Microsoft Internet Explorer web browser. A programming or design flaw in an ActiveX control can allow arbitrary code execution as the result of viewing a specially-crafted web page. In this paper, we examine effective techniques for fuzz testing ActiveX controls, using the Dranzer tool developed...

متن کامل

Montage - an ActiveX Container for Dynamic Interfaces

Montage is a customizable, embeddable ActiveX container. Its client objects may be positioned dynamically by an external layout agent. Montage manages toolbars and user interface modes, integrating disparate components into a single, consistent interface. An important part of this task is supporting “group repositories” of related objects for data transfer operations such as cut-and-paste, drag...

متن کامل

Post-Exploitation on Windows using ActiveX Controls

When exploiting software vulnerabilities it is sometimes impossible to build direct communication channels between a target machine and an attacker’s machine due to restrictive outbound filters that may be in place on the target machine’s network. Bypassing these filters involves creating a postexploitation payload that is capable of masquerading as normal user traffic from within the context o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Software: Practice and Experience

سال: 2001

ISSN: 0038-0644,1097-024X

DOI: 10.1002/1097-024x(200102)31:2<147::aid-spe360>3.0.co;2-v