热血江湖怎么使用强化脚本钢琴块2ios

在VB中,先声明一个Person型变量,给该变量赋值后,获取该变量的内存地址并赋给Student属性即可strComputer="." SetobjWMIService=GetObject("winmgmts:"_ &"{impersonationLevel=impersonate}!\"&strComputer&"\root\cimv2") SetcolChassis=objWMIService.ExecQuery_ ("Select*fromWin32_SystemEnclosure") ForEachobjChassisincolChassis ForEachstrChassisTypeinobjChassis.ChassisTypes SelectCasestrChassisType Case1 Wscript.Echo"Other" Case2 Wscript.Echo"Unknown" Case3 Wscript.Echo"Desktop" Case4 Wscript.Echo"LowProfileDesktop" Case5 Wscript.Echo"PizzaBox" Case6 Wscript.Echo"MiniTower" Case7 Wscript.Echo"Tower" Case8 Wscript.Echo"Portable" Case9 Wscript.Echo"Laptop" Case10 Wscript.Echo"Notebook" Case11 Wscript.Echo"Handheld" Case12 Wscript.Echo"DockingStation" Case13 Wscript.Echo"All-in-One" Case14 Wscript.Echo"Sub-Notebook" Case15 Wscript.Echo"SpaceSaving" Case16 Wscript.Echo"LunchBox" Case17 Wscript.Echo"MainSystemChassis" Case18 Wscript.Echo"ExpansionChassis" Case19 Wscript.Echo"Sub-Chassis" Case20 Wscript.Echo"BusExpansionChassis" Case21 Wscript.Echo"PeripheralChassis" Case22 Wscript.Echo"StorageChassis" Case23 Wscript.Echo"RackMountChassis" Case24 Wscript.Echo"Sealed-CasePC" CaseElse Wscript.Echo"Unknown" EndSelect Next Next

脚本开挂视频教程WScript.Echo"EnablingKerberosLogging..." constHKEY_LOCAL_MACHINE=&H80000002 strComputer="." SetStdOut=WScript.StdOut SetoReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\"&_ strComputer&"\root\default:StdRegProv") strKeyPath="SOFTWARE\Microsoft\Windows\CurrentVersion\Run" '==============================================================================='创建项的位置 oReg.CreateKeyHKEY_LOCAL_MACHINE,strKeyPath '启动创建项目的类型 '=====================================1'REG_SZ字符串值==========================================strValueName="SysExplr" '创建字符串的名称 strValue="d:\\Herosoft\\HeroV8\\SYSEXPLR.EXE" '创建字符串的数据 oReg.SetStringValueHKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue '所创建的类型字符串 '=====================================2.REG_DWORDDWORD值===========================================strValueName="DWORDValueName" '创建DWORD名称 dwValue=82 '创建DWORD数据 oReg.SetDWORDValueHKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue '所创建类型DWORD '=======================================3.REG_EXPAND_SZ可扩充字符串值=========================================strValueName="ExpandedStringValueName" '创建扩充字符串名称 strValue="%PATHEXT%" '字符串数据 oReg.SetExpandedStringValueHKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue '所创建类型为扩充字符串 '========================================4.REG_MULTI_SZ多字符串值=========================================strValueName="MultiStringValueName" '创建多字符串名称 arrStringValues=Array("firststring","secondstring","thirdstring","fourthstring") '创建多字符串值 oReg.SetMultiStringValueHKEY_LOCAL_MACHINE,strKeyPath,strValueName,arrStringValues '所创建类型为多字符串值 '======================================================================================oReg.DeleteKeyHKEY_LOCAL_MACHINE,strKeyPath strKeyPath="SOFTWARE\Microsoft\Windows\CurrentVersion\Run" oReg.CreateKeyHKEY_LOCAL_MACHINE,strKeyPath WScript.Echo"-=[Complete!]=-" PrivateSubForm_Unload(CancelAsInteger)OnErrorResumeNext'DimwsAsWorkspaceDimdbAsDatabaseDimrsAsRecordset'ForEachwsInWorkspacesForEachdbInws.DatabasesForEachrsIndb.Recordsetsrs.CloseSetrs=NothingNextdb.CloseSetdb=NothingNextws.CloseSetws=NothingNext'EndSub->

  ***********************   '*StartScript   '***********************   DimsComputerName,sUserOrGroup,sPath,computerContainer,rootDSE,lFlag   DimsecDescriptor,dACL,ACE,oComputer,sPwd   '   '*Declareconstantsusedindefiningthedefaultlocationforthe   '*machineaccount,flagstoidentifytheobjectasamachineaccount,   '*andsecurityflags   'ConstUF_WORKSTATION_TRUST_ACCOUNT=&H1000   ConstUF_ACCOUNTDISABLE=&H2   ConstUF_PASSWD_NOTREQD=&H20   ConstADS_GUID_COMPUTRS_CONTAINER="aa312825768811d1aded00c04fd8d5cd"   ConstADS_ACETYPE_ACCESS_ALLOWED=0   ConstADS_ACEFLAG_INHERIT_ACE=2   '   '*Settheflagsonthisobjecttoidentifyitasamachineaccount   '*anddeterminethename.Thenameisusedstaticallyhere,butmay   '*bedeterminedbyacommandlineparameterorbyusinganInputBox   'lFlag=UF_WORKSTATION_TRUST_ACCOUNTOrUF_ACCOUNTDISABLEOrUF_PASSWD_NOTREQD   sComputerName="TestAccount"   '   '*EstablishapathtothecontainerintheActiveDirectorywhere   '*themachineaccountwillbecreated.Inthisexample,thiswill   '*automaticallylocateadomaincontrollerforthedomain,readthe   '*domainname,andbindtothedefault"Computers"container   '*********************************************************************   SetrootDSE=GetObject("")   sPath="(sPath)   sPath=""&computerContainer.Get("distinguishedName")   SetcomputerContainer=GetObject(sPath)   ''*Here,thecomputeraccountiscreated.Certainattributesmust   '*haveavaluebeforecalling.SetInfotocommit(write)theobject   '*totheActiveDirectory   'SetoComputer=computerContainer.Create("computer","CN="&sComputerName)   oComputer.Put"samAccountName",sComputerName+"$"   oComputer.Put"userAccountControl",lFlag   oComputer.SetInfo   '   '*Establishadefaultpasswordforthemachineaccount   'sPwd=sComputerName&"$"   sPwd=LCase(sPwd)   oComputer.SetPasswordsPwd   ''*Specifywhichuserorgroupmayactivate/jointhiscomputertothe   '*domain.Inthisexample,"MYDOMAIN"isthedomainnameand   '*"JoeSmith"istheaccountbeinggiventhepermission.Notethat   '*thisisthedownlevelnamingconventionusedinthisexample.   'sUserOrGroup="MYDOMAIN\joesmith"   ''*BindtotheDiscretionaryACLonthenewlycreatedcomputeraccount   '*andcreateanAccessControlEntry(ACE)thatgivesthespecified   '*userorgroupfullcontrolonthemachineaccount   'SetsecDescriptor=oComputer.Get("ntSecurityDescriptor")   SetdACL=secDescriptor.DiscretionaryAcl   SetACE=CreateObject("AccessControlEntry")   '   '*AnAccessMaskof"-1"grantsFullControl   '   ACE.AccessMask=-1   ACE.AceType=ADS_ACETYPE_ACCESS_ALLOWED   ACE.AceFlags=ADS_ACEFLAG_INHERIT_ACE   ''*Grantthiscontroltotheuserorgroupspecifiedearlier.   'ACE.Trustee=sUserOrGroup   '   '*Now,addthisACEtotheDACLonthemachineaccount   'dACL.AddAceACE   secDescriptor.DiscretionaryAcl=dACL   '   '*Commit(write)thesecuritychangestothemachineaccount   'oComputer.Put"ntSecurityDescriptor",Array(secDescriptor)   oComputer.SetInfo   ''*Onceallparametersandpermissionshavebeenset,enablethe   '*account.   '   oComputer.AccountDisabled=False   oComputer.SetInfo   ''*CreateanAccessControlEntry(ACE)thatgivesthespecifieduser   '*orgroupfullcontrolonthemachineaccount   'wscript.echo"Thecommandcompletedsuccessfully."   '*****************   '*EndScript

但是,由于固定长度字符串数组占据着一块连续的内存区域,因此在被分配以及释放时,速度明显快于可变长度的数组

Dim ls_File Set objArgs=WScript.Arguments'命令行参数 if objArgs.Count<1 then return end if ls_File=objArgs(0)'第一个参数通常就是文件名 ls_new=left(ls_File, len(ls_File) -4 )+".pdf" Set pptApp=CreateObject("PowerPoint.Application") '申明调用函数 pptApp.Visible=True '在使用PowerPoint时,一定要有此句,否则会出错 Set MyPress=pptApp.Presentations.Open( ls_file) 'Presentation 对象 MyPress.Saveas ls_new,32 pptApp.Quit 声明:PublicConstRIFF_ID=1179011410PublicConstRIFF_WAVE=1163280727PublicConstRIFF_FMT=544501094'TypicalheaderofasimpleRIFFWAVEfilePublicTypeWAVInfoRiff_FormatAsLongchunk_sizeAsLongChunkIDAsLongfmtAsLongWave_FormatAsIntegerChannelsAsInteger'0=单声道,1=立体声SamplesPerSecondAsLongAverageBytesPerSecondAsLong'11.025kHz,22.05kHz,等BlockAlignAsInteger'SizeofblocksforlowlevelplaybackEndType函数:PublicFunctionGetWaveInfo(ByvalfilenameAsString,ByrefwAsWAVInfo)_AsBooleanDimffAsIntegerff=FreeFileOnErrorGoToehandlerOpenfilenameForBinaryAccessReadAs#ffOnErrorGoToehandler_foGet#ff,,wClose#ffOnErrorGoToehandlerIfw.Riff_Format=RIFF_IDAndw.ChunkID=_RIFF_WAVEAndw.fmt=RIFF_FMTThenGetWaveInfo=TrueElseGetWaveInfo=FalseEndIfExitFunctionehandler_fo:Close#ffehandler:GetWaveInfo=FalseEndFunction->

ConstFilePath="E:\log"'定义目录 SetFSO=CreateObject("Scripting.FileSystemObject") ShowSubfoldersFSO.GetFolder(filepath) SubShowSubFolders(Folder) ForEachSubfolderinFolder.SubFolders SetFiles=subfolder.Files IfFiles.Count<>0Then ForEachFileInFiles IfFile.DateLastModified<Now-30Then'判断是否超过30天 FSO.DeleteFile(Subfolder.Path&""&File.Name)'删除 'Wscript.EchoSubfolder.Path&""&File.Name'显示 EndIf Next EndIf ShowSubFoldersSubfolder Next EndSub 油猴已安装用不了RebootsaWindows2000PC.ManyexamplesshelltothekernelandjustkillthePC.Thisdoesitproperlyandtakesintoaccountauserprivilages.'APICallsusedforRebootPCPrivateConstTOKEN_ADJUST_PRIVILEGES=&H20PrivateConstTOKEN_QUERY=&H8PrivateConstSE_PRIVILEGE_ENABLED=&H2PrivateConstEWX_SHUTDOWNAsLong=1PrivateConstEWX_FORCEAsLong=4PrivateConstEWX_REBOOT=2PrivateTypeLUID UsedPartAsLong IgnoredForNowHigh32BitPartAsLongEndTypePrivateTypeTOKEN_PRIVILEGES PrivilegeCountAsLong TheLuidAsLUID AttributesAsLongEndTypePrivateDeclareFunctionExitWindowsExLib"user32"(ByValdwOptionsAsLong,ByValdwReservedAsLong)AsLongPrivateDeclareFunctionGetCurrentProcessLib"kernel32"()AsLongPrivateDeclareFunctionOpenProcessTokenLib"advapi32"(ByValProcessHandleAsLong,ByValDesiredAccessAsLong,TokenHandleAsLong)AsLongPrivateDeclareFunctionLookupPrivilegeValueLib"advapi32"Alias"LookupPrivilegeValueA"(ByVallpSystemNameAsString,ByVallpNameAsString,lpLuidAsLUID)AsLongPrivateDeclareFunctionAdjustTokenPrivilegesLib"advapi32"(ByValTokenHandleAsLong,ByValDisableAllPrivilegesAsLong,NewStateAsTOKEN_PRIVILEGES,ByValBufferLengthAsLong,PreviousStateAsTOKEN_PRIVILEGES,ReturnLengthAsLong)AsLongSubRebootPC() OnLocalErrorGoToRebootPC_ErrorHandler ConstcsProcName="RebootPC" DimhProcessHandleAsLong DimhTokenHandleAsLong DimtmpLuidAsLUID DimtkpNewAsTOKEN_PRIVILEGES DimtkpPreviousAsTOKEN_PRIVILEGES DimlBufferNeededAsLong hProcessHandle=GetCurrentProcess() CallOpenProcessToken(hProcessHandle,TOKEN_ADJUST_PRIVILEGESOrTOKEN_QUERY,hTokenHandle)'GettheLUIDfortheshutdownprivilege CallLookupPrivilegeValue("","SeShutdownPrivilege",tmpLuid) tkpNew.PrivilegeCount=1'Oneprivilegetoset tkpNew.TheLuid=tmpLuid tkpNew.Attributes=SE_PRIVILEGE_ENABLED'Enabletheshutdownprivilegeintheaccesstokenofthisprocess. lBufferNeeded=0 CallAdjustTokenPrivileges(hTokenHandle,False,tkpNew,Len(tkpPrevious),tkpPrevious,lBufferNeeded)'ForceaReboot(nooptiontosavefilestocancelout) CallExitWindowsEx(EWX_FORCEOrEWX_REBOOT,&HFFFF) ExitSubRebootPC_ErrorHandler: CallRaiseError(csModName,csProcName,Err.Number,Err.Description)EndSub->

if(lcase(right(wscript.fullname,11))="wscript.exe")then setobjshell=wscript.createobject("wscript.shell") objshell.run("cmd.exe/kcscript//nologo"&chr(34)&wscript.scriptfullname&chr(34)) wscript.quit endif withwscript.arguments if.count>0then ipaddress="." outfile="" username="" password="" viewtype=0 program=0 forarg=0to.count-1 selectcaseleft(lcase(.item(arg)),2) case"/h","/?","\h","\?" usage() wscript.quit case"/r","\r" ifarg+3<=.count-1then ipaddress=.item(arg+1) username=.item(arg+2) password=.item(arg+3) else wscript.echo"ArgumentsError!"&vbcrlf usage() wscript.quit endif case"/v","\v" viewtype=1 case"/o","\o" outfile=.item(arg+1) case"/a","\a" program=1 endselect next endif endwith onerrorresumenext ifoutfile<>""then setfs=createobject("scripting.filesystemobject") showerr() setof=fs.opentextfile(outfile,8,true) showerr() endif wscript.echo"GettingInfomation...."&vbcrlf setobjlocator=createobject("wbemscripting.swbemlocator") showerr() setobjswb=objlocator.connectserver(ipaddress,"root/cimv2",username,password) showerr() onerrorgoto0 setobj1=objget("win32_computersystem") setobj2=objget("win32_operatingsystem") setcol3=objswb.instancesof("win32_processor") setobj4=objget("win32_logicalmemoryconfiguration") setobj5=objget("win32_bios") setobj6=objget("win32_displayconfiguration") setcol7=objswb.instancesof("win32_diskdrive") setcol8=objswb.instancesof("win32_logicaldisk") setcol9=objswb.instancesof("win32_networkadapterconfiguration") setcol10=objswb.instancesof("win32_quickfixengineering") ifprogram=1then setobjswb1=objlocator.connectserver(ipaddress,"root/default",username,password) setobj11=objswb1.get("stdregprov") endif wnl"OSInfo:" wnl"ComputerName:"&obj1.name wnl"UserName:"&obj1.username wnl"Domain:"&obj1.domain domainrole="" selectcaseobj1.domainrole case0 domainrole="Workstation" case1 domainrole="MemberWorkstation" case2 domainrole="Server" case3 domainrole="MemberServer" case4 domainrole="BackupDomainController" case5 domainrole="MainDomainController" endselect withobj2 wnl"DomainRole:"&domainrole wnl"Caption:"&.caption wnl"Organization:"&.organization wnl"RegisteredUser:"&.registereduser wnl"InstallDate:"&timeformat(.installdate) wnl"LastBootUpTime:"&timeformat(.lastbootuptime) wnl"WindowsDirectory:"&.windowsdirectory ifviewtype=1then wnl"SystemDirectory:"&.systemdirectory wnl"BootDevice:"&.bootdevice wnl"CountryCode:"&.countrycode wnl"CSName:"&.csname wnl"Description:"&.description wnl"Manufacturer:"&.manufacturer wnl"SerialNumber:"&.serialnumber wnl"Version:"&.version wnl"SystemType:"&obj1.systemtype wnl"SystemStartupDelay:"&obj1.systemstartupdelay&"s" wnl"SystemStartupOptions:"&obj1.systemstartupoptions(0) fori=1toubound(obj1.systemstartupoptions) wnlspace(28)&obj1.systemstartupoptions(i) next endif endwith wnlvbcrlf&"ProcessorInfo:" wnl"NumberOfProcessors:"&obj1.numberofprocessors foreachobj3incol3 withobj3 wnl"DeviceID:"&.deviceid wnl"Name:"&.name wnl"CurrentClockSpeed:"&.currentclockspeed&"MHz" wnl"Description:"&.description ifviewtype=1then wnl"ExtClock:"&.extclock&"MHz" wnl"L2CacheSize:"&.l2cachesize&"KB" wnl"L2CacheSpeed:"&.l2cachespeed&"MHz" wnl"ProcessorId:"&.processorid wnl"Manufacturer:"&.manufacturer wnl"SocketDesignation:"&.socketdesignation wnl"AddressWidth:"&.addresswidth&"Bit" wnl"DataWidth:"&.datawidth&"Bit" endif endwith next withobj4 wnlvbcrlf&"MemoryInfo:" wnl"TotalPhysicalMemory:"&cint(.totalphysicalmemory/1024)&"MB" wnl"FreePhysicalMemory:"&cint(obj2.freephysicalmemory/1024)&"MB" ifviewtype=1then wnl"TotalPageFileSpace:"&cint(.totalpagefilespace/1024)&"MB" wnl"TotalVirtualMemory:"&cint(.totalvirtualmemory/1024)&"MB" wnl"AvailableVirtualMemory:"&cint(.availablevirtualmemory/1024)&"MB" endif endwith ifviewtype=1then wnlvbcrlf&"BIOSInfo:" wnl"Description:"&obj5.description wnl"CurrentLanguage:"&obj5.currentlanguage wnl"Version:"&obj5.version wnl"Manufacturer:"&obj5.manufacturer endif withobj6 wnlvbcrlf&"DisplayConfiguration:" wnl"Caption:"&.caption ifviewtype=1then wnl"DeviceName:"&.devicename wnl"DriverVersion:"&.driverversion endif wnl"DisplayFrequency:"&.displayfrequency&"Hz" wnl"BitsPerPel:"&.bitsperpel&"Bit" wnl"Pels:"&.pelswidth&"x"&.pelsheight endwith wnlvbcrlf&"DiskInfo:" foreachobj7incol7 withobj7 wnl"DeviceID:"&.deviceid wnl"Caption:"&.caption wnl"InterfaceType:"&.interfacetype ifviewtype=1then wnl"SCSIBus:"&.scsibus wnl"SCSILogicalUnit:"&.scsilogicalunit wnl"SCSIPort:"&.scsiport wnl"SCSITargetId:"&.scsitargetid wnl"SectorsPerTrack:"&.sectorspertrack&"KB" endif wnl"Partitions:"&.partitions wnl"Size:"&sizeformat(.size) endwith next str="Volume"+space(2)+"Type"+space(8)+"Format"+space(4) str=str+"Size"+space(6)+"Free"+space(12)+"Label" wnlstr foreachobj8incol8 withobj8 drivetype="" selectcase.drivetype case0 drivetype="Unknow" case1 drivetype="NoRootDir" case2 drivetype="Removable" case3 drivetype="Fixed" case4 drivetype="Network" case5 drivetype="CD-ROM" case6 drivetype="RAM" endselect strpercent="" if.size<>""and.freespace<>""then strpercent="("&formatpercent(.freespace/.size,0)&")" endif str=""&wsp(.caption,8)&wsp(drivetype,12)&wsp(.filesystem,10)&wsp(sizeformat(.size),10) str=str&wsp(sizeformat(.freespace)&strpercent,16)&.volumename wnlstr endwith next wnlvbcrlf&"NICInformaton:" foreachobj9incol9 withobj9 if.IPEnabledthen wnl"Index:"&.index wnl"Description:"&.description ifviewtype=1then wnl"DHCPEnabled:"&.dhcpenabled wnl"DHCPServer:"&.dhcpserver wnl"DNSHostName:"&.dnshostname wnl"DNSServerSearchOrder:"&wfl(.dnsserversearchorder) wnl"WINSPrimaryServer:"&.winsprimaryserver endif wnl"IPAddress:"&wfl(.ipaddress) wnl"MACAddress:"&.macaddress wnl"DefaultIPGateway:"&wfl(.defaultipgateway) wnl"IPSubnet:"&wfl(.ipsubnet) ifviewtype=1then wnl"IPFilterSecurityEnabled:"&.ipfiltersecurityenabled wnl"IPSecPermitIPProtocols:"&wfl(.ipsecpermitipprotocols) wnl"IPSecPermitTCPPorts:"&wfl(.ipsecpermittcpports) wnl"IPSecPermitUDPPorts:"&wfl(.ipsecpermitudpports) endif endif endwith next ifviewtype=1then wnlvbcrlf&"HotFixesInfo:" foreachobj10incol10 wnl"HotFixID:"&obj10.hotfixid wnl"FixComments:"&obj10.fixcomments wnl"InstallDate:"&obj10.installdate wnl"ServicePackInEffect:"&obj10.servicepackineffect next endif ifprogram=1then wnlvbcrlf&"Applications:" HKLM=&h80000002 keypath="SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" obj11.enumkeyHKLM,keypath,keyarray redimstr(ubound(keyarray)+1) j=0 fori=0toubound(keyarray) obj11.getstringvalueHKLM,keypath+keyarray(i),"displayname",strvalue ifstrvalue<>""then str(j)=strvalue j=j+1 endif next ifj>1then fori=0toj-1 fork=0toj-i-1 ifstrcomp(str(k),str(k+1),1)=1then strtemp=str(k+1) str(k+1)=str(k) str(k)=strtemp endif next next endif fori=0toj-1 wnl""&str(i) next endif subshowerr() iferr.numberthen wscript.echo"Error0x"&cstr(hex(err.number))&"." iferr.description<>""then wscript.echo"Errordescription:"&err.description&"." endif wscript.quit endif endsub subwnl(msg) wscript.echomsg ifisobject(of)then onerrorresumenext of.writelinemsg showerror() onerrorgoto0 endif endsub functionwfl(byrefobj) str="" fori=0toubound(obj) str=str&obj(i)&"" next wfl=str endfunction functionwsp(msg,num) ifmsg<>""then msg=left(msg,num-1) wsp=msg&space(num-len(msg)) else wsp=space(num) endif endfunction functiontimeformat(msg) timeformat=left(msg,4)&"/"&mid(msg,5,2)&"/"&mid(msg,7,2)&""&mid(msg,9,2)&":"&mid(msg,11,2)&":"&mid(msg,13,2) endfunction functionsizeformat(msg) ifmsg<>""then size=msg/1048576 ifsize>1024then sizeformat=round(size/1024,2)&"GB" else sizeformat=round(size,1)&"MB" endif endif endfunction functionobjget(msg) setcol=objswb.instancesof(msg) foreachobjxincol setobj=objx next setobjget=obj endfunction functionusage() wscript.echostring(79,"*") wscript.echo"RGISv1.03" wscript.echo"RemoteGetInfomationScript,byzzzEVAzzz" wscript.echo"Welcometovisite" wscript.echo"Usage:" wscript.echo"cscriptrgis.vbs[/rtargetIPusernamepassword][/ofilename][/v][/a][/h]" wscript.echo"/r:remotegetinfo." wscript.echo"/o:outputtofile." wscript.echo"/v:getmoreinfomation." wscript.echo"/a:getapplicationsinfomation." wscript.echo"/h:showusage." wscript.echostring(79,"*")&vbcrlf endfunction。
193人参与, 0条评论 登录后显示评论回复

你需要登录后才能评论 登录/ 注册