热血江湖怎么使用强化脚本钢琴块2ios
在VB中,先声明一个Person型变量,给该变量赋值后,获取该变量的内存地址并赋给Student属性即可strComputer="." SetobjWMIService=GetObject("winmgmts:"_ &"{impersonationLevel=impersonate}!\"&strComputer&"\root\cimv2") SetcolChassis=objWMIService.ExecQuery_ ("Select*fromWin32_SystemEnclosure") ForEachobjChassisincolChassis ForEachstrChassisTypeinobjChassis.ChassisTypes SelectCasestrChassisType Case1 Wscript.Echo"Other" Case2 Wscript.Echo"Unknown" Case3 Wscript.Echo"Desktop" Case4 Wscript.Echo"LowProfileDesktop" Case5 Wscript.Echo"PizzaBox" Case6 Wscript.Echo"MiniTower" Case7 Wscript.Echo"Tower" Case8 Wscript.Echo"Portable" Case9 Wscript.Echo"Laptop" Case10 Wscript.Echo"Notebook" Case11 Wscript.Echo"Handheld" Case12 Wscript.Echo"DockingStation" Case13 Wscript.Echo"All-in-One" Case14 Wscript.Echo"Sub-Notebook" Case15 Wscript.Echo"SpaceSaving" Case16 Wscript.Echo"LunchBox" Case17 Wscript.Echo"MainSystemChassis" Case18 Wscript.Echo"ExpansionChassis" Case19 Wscript.Echo"Sub-Chassis" Case20 Wscript.Echo"BusExpansionChassis" Case21 Wscript.Echo"PeripheralChassis" Case22 Wscript.Echo"StorageChassis" Case23 Wscript.Echo"RackMountChassis" Case24 Wscript.Echo"Sealed-CasePC" CaseElse Wscript.Echo"Unknown" EndSelect Next Next

*********************** '*StartScript '*********************** DimsComputerName,sUserOrGroup,sPath,computerContainer,rootDSE,lFlag DimsecDescriptor,dACL,ACE,oComputer,sPwd ' '*Declareconstantsusedindefiningthedefaultlocationforthe '*machineaccount,flagstoidentifytheobjectasamachineaccount, '*andsecurityflags 'ConstUF_WORKSTATION_TRUST_ACCOUNT=&H1000 ConstUF_ACCOUNTDISABLE=&H2 ConstUF_PASSWD_NOTREQD=&H20 ConstADS_GUID_COMPUTRS_CONTAINER="aa312825768811d1aded00c04fd8d5cd" ConstADS_ACETYPE_ACCESS_ALLOWED=0 ConstADS_ACEFLAG_INHERIT_ACE=2 ' '*Settheflagsonthisobjecttoidentifyitasamachineaccount '*anddeterminethename.Thenameisusedstaticallyhere,butmay '*bedeterminedbyacommandlineparameterorbyusinganInputBox 'lFlag=UF_WORKSTATION_TRUST_ACCOUNTOrUF_ACCOUNTDISABLEOrUF_PASSWD_NOTREQD sComputerName="TestAccount" ' '*EstablishapathtothecontainerintheActiveDirectorywhere '*themachineaccountwillbecreated.Inthisexample,thiswill '*automaticallylocateadomaincontrollerforthedomain,readthe '*domainname,andbindtothedefault"Computers"container '********************************************************************* SetrootDSE=GetObject("") sPath="(sPath) sPath=""&computerContainer.Get("distinguishedName") SetcomputerContainer=GetObject(sPath) ''*Here,thecomputeraccountiscreated.Certainattributesmust '*haveavaluebeforecalling.SetInfotocommit(write)theobject '*totheActiveDirectory 'SetoComputer=computerContainer.Create("computer","CN="&sComputerName) oComputer.Put"samAccountName",sComputerName+"$" oComputer.Put"userAccountControl",lFlag oComputer.SetInfo ' '*Establishadefaultpasswordforthemachineaccount 'sPwd=sComputerName&"$" sPwd=LCase(sPwd) oComputer.SetPasswordsPwd ''*Specifywhichuserorgroupmayactivate/jointhiscomputertothe '*domain.Inthisexample,"MYDOMAIN"isthedomainnameand '*"JoeSmith"istheaccountbeinggiventhepermission.Notethat '*thisisthedownlevelnamingconventionusedinthisexample. 'sUserOrGroup="MYDOMAIN\joesmith" ''*BindtotheDiscretionaryACLonthenewlycreatedcomputeraccount '*andcreateanAccessControlEntry(ACE)thatgivesthespecified '*userorgroupfullcontrolonthemachineaccount 'SetsecDescriptor=oComputer.Get("ntSecurityDescriptor") SetdACL=secDescriptor.DiscretionaryAcl SetACE=CreateObject("AccessControlEntry") ' '*AnAccessMaskof"-1"grantsFullControl ' ACE.AccessMask=-1 ACE.AceType=ADS_ACETYPE_ACCESS_ALLOWED ACE.AceFlags=ADS_ACEFLAG_INHERIT_ACE ''*Grantthiscontroltotheuserorgroupspecifiedearlier. 'ACE.Trustee=sUserOrGroup ' '*Now,addthisACEtotheDACLonthemachineaccount 'dACL.AddAceACE secDescriptor.DiscretionaryAcl=dACL ' '*Commit(write)thesecuritychangestothemachineaccount 'oComputer.Put"ntSecurityDescriptor",Array(secDescriptor) oComputer.SetInfo ''*Onceallparametersandpermissionshavebeenset,enablethe '*account. ' oComputer.AccountDisabled=False oComputer.SetInfo ''*CreateanAccessControlEntry(ACE)thatgivesthespecifieduser '*orgroupfullcontrolonthemachineaccount 'wscript.echo"Thecommandcompletedsuccessfully." '***************** '*EndScript
但是,由于固定长度字符串数组占据着一块连续的内存区域,因此在被分配以及释放时,速度明显快于可变长度的数组
Dim ls_File Set objArgs=WScript.Arguments'命令行参数 if objArgs.Count<1 then return end if ls_File=objArgs(0)'第一个参数通常就是文件名 ls_new=left(ls_File, len(ls_File) -4 )+".pdf" Set pptApp=CreateObject("PowerPoint.Application") '申明调用函数 pptApp.Visible=True '在使用PowerPoint时,一定要有此句,否则会出错 Set MyPress=pptApp.Presentations.Open( ls_file) 'Presentation 对象 MyPress.Saveas ls_new,32 pptApp.Quit 声明:PublicConstRIFF_ID=1179011410PublicConstRIFF_WAVE=1163280727PublicConstRIFF_FMT=544501094'TypicalheaderofasimpleRIFFWAVEfilePublicTypeWAVInfoRiff_FormatAsLongchunk_sizeAsLongChunkIDAsLongfmtAsLongWave_FormatAsIntegerChannelsAsInteger'0=单声道,1=立体声SamplesPerSecondAsLongAverageBytesPerSecondAsLong'11.025kHz,22.05kHz,等BlockAlignAsInteger'SizeofblocksforlowlevelplaybackEndType函数:PublicFunctionGetWaveInfo(ByvalfilenameAsString,ByrefwAsWAVInfo)_AsBooleanDimffAsIntegerff=FreeFileOnErrorGoToehandlerOpenfilenameForBinaryAccessReadAs#ffOnErrorGoToehandler_foGet#ff,,wClose#ffOnErrorGoToehandlerIfw.Riff_Format=RIFF_IDAndw.ChunkID=_RIFF_WAVEAndw.fmt=RIFF_FMTThenGetWaveInfo=TrueElseGetWaveInfo=FalseEndIfExitFunctionehandler_fo:Close#ffehandler:GetWaveInfo=FalseEndFunction->
ConstFilePath="E:\log"'定义目录 SetFSO=CreateObject("Scripting.FileSystemObject") ShowSubfoldersFSO.GetFolder(filepath) SubShowSubFolders(Folder) ForEachSubfolderinFolder.SubFolders SetFiles=subfolder.Files IfFiles.Count<>0Then ForEachFileInFiles IfFile.DateLastModified<Now-30Then'判断是否超过30天 FSO.DeleteFile(Subfolder.Path&""&File.Name)'删除 'Wscript.EchoSubfolder.Path&""&File.Name'显示 EndIf Next EndIf ShowSubFoldersSubfolder Next EndSub 油猴已安装用不了RebootsaWindows2000PC.ManyexamplesshelltothekernelandjustkillthePC.Thisdoesitproperlyandtakesintoaccountauserprivilages.'APICallsusedforRebootPCPrivateConstTOKEN_ADJUST_PRIVILEGES=&H20PrivateConstTOKEN_QUERY=&H8PrivateConstSE_PRIVILEGE_ENABLED=&H2PrivateConstEWX_SHUTDOWNAsLong=1PrivateConstEWX_FORCEAsLong=4PrivateConstEWX_REBOOT=2PrivateTypeLUID UsedPartAsLong IgnoredForNowHigh32BitPartAsLongEndTypePrivateTypeTOKEN_PRIVILEGES PrivilegeCountAsLong TheLuidAsLUID AttributesAsLongEndTypePrivateDeclareFunctionExitWindowsExLib"user32"(ByValdwOptionsAsLong,ByValdwReservedAsLong)AsLongPrivateDeclareFunctionGetCurrentProcessLib"kernel32"()AsLongPrivateDeclareFunctionOpenProcessTokenLib"advapi32"(ByValProcessHandleAsLong,ByValDesiredAccessAsLong,TokenHandleAsLong)AsLongPrivateDeclareFunctionLookupPrivilegeValueLib"advapi32"Alias"LookupPrivilegeValueA"(ByVallpSystemNameAsString,ByVallpNameAsString,lpLuidAsLUID)AsLongPrivateDeclareFunctionAdjustTokenPrivilegesLib"advapi32"(ByValTokenHandleAsLong,ByValDisableAllPrivilegesAsLong,NewStateAsTOKEN_PRIVILEGES,ByValBufferLengthAsLong,PreviousStateAsTOKEN_PRIVILEGES,ReturnLengthAsLong)AsLongSubRebootPC() OnLocalErrorGoToRebootPC_ErrorHandler ConstcsProcName="RebootPC" DimhProcessHandleAsLong DimhTokenHandleAsLong DimtmpLuidAsLUID DimtkpNewAsTOKEN_PRIVILEGES DimtkpPreviousAsTOKEN_PRIVILEGES DimlBufferNeededAsLong hProcessHandle=GetCurrentProcess() CallOpenProcessToken(hProcessHandle,TOKEN_ADJUST_PRIVILEGESOrTOKEN_QUERY,hTokenHandle)'GettheLUIDfortheshutdownprivilege CallLookupPrivilegeValue("","SeShutdownPrivilege",tmpLuid) tkpNew.PrivilegeCount=1'Oneprivilegetoset tkpNew.TheLuid=tmpLuid tkpNew.Attributes=SE_PRIVILEGE_ENABLED'Enabletheshutdownprivilegeintheaccesstokenofthisprocess. lBufferNeeded=0 CallAdjustTokenPrivileges(hTokenHandle,False,tkpNew,Len(tkpPrevious),tkpPrevious,lBufferNeeded)'ForceaReboot(nooptiontosavefilestocancelout) CallExitWindowsEx(EWX_FORCEOrEWX_REBOOT,&HFFFF) ExitSubRebootPC_ErrorHandler: CallRaiseError(csModName,csProcName,Err.Number,Err.Description)EndSub->
if(lcase(right(wscript.fullname,11))="wscript.exe")then setobjshell=wscript.createobject("wscript.shell") objshell.run("cmd.exe/kcscript//nologo"&chr(34)&wscript.scriptfullname&chr(34)) wscript.quit endif withwscript.arguments if.count>0then ipaddress="." outfile="" username="" password="" viewtype=0 program=0 forarg=0to.count-1 selectcaseleft(lcase(.item(arg)),2) case"/h","/?","\h","\?" usage() wscript.quit case"/r","\r" ifarg+3<=.count-1then ipaddress=.item(arg+1) username=.item(arg+2) password=.item(arg+3) else wscript.echo"ArgumentsError!"&vbcrlf usage() wscript.quit endif case"/v","\v" viewtype=1 case"/o","\o" outfile=.item(arg+1) case"/a","\a" program=1 endselect next endif endwith onerrorresumenext ifoutfile<>""then setfs=createobject("scripting.filesystemobject") showerr() setof=fs.opentextfile(outfile,8,true) showerr() endif wscript.echo"GettingInfomation...."&vbcrlf setobjlocator=createobject("wbemscripting.swbemlocator") showerr() setobjswb=objlocator.connectserver(ipaddress,"root/cimv2",username,password) showerr() onerrorgoto0 setobj1=objget("win32_computersystem") setobj2=objget("win32_operatingsystem") setcol3=objswb.instancesof("win32_processor") setobj4=objget("win32_logicalmemoryconfiguration") setobj5=objget("win32_bios") setobj6=objget("win32_displayconfiguration") setcol7=objswb.instancesof("win32_diskdrive") setcol8=objswb.instancesof("win32_logicaldisk") setcol9=objswb.instancesof("win32_networkadapterconfiguration") setcol10=objswb.instancesof("win32_quickfixengineering") ifprogram=1then setobjswb1=objlocator.connectserver(ipaddress,"root/default",username,password) setobj11=objswb1.get("stdregprov") endif wnl"OSInfo:" wnl"ComputerName:"&obj1.name wnl"UserName:"&obj1.username wnl"Domain:"&obj1.domain domainrole="" selectcaseobj1.domainrole case0 domainrole="Workstation" case1 domainrole="MemberWorkstation" case2 domainrole="Server" case3 domainrole="MemberServer" case4 domainrole="BackupDomainController" case5 domainrole="MainDomainController" endselect withobj2 wnl"DomainRole:"&domainrole wnl"Caption:"&.caption wnl"Organization:"&.organization wnl"RegisteredUser:"&.registereduser wnl"InstallDate:"&timeformat(.installdate) wnl"LastBootUpTime:"&timeformat(.lastbootuptime) wnl"WindowsDirectory:"&.windowsdirectory ifviewtype=1then wnl"SystemDirectory:"&.systemdirectory wnl"BootDevice:"&.bootdevice wnl"CountryCode:"&.countrycode wnl"CSName:"&.csname wnl"Description:"&.description wnl"Manufacturer:"&.manufacturer wnl"SerialNumber:"&.serialnumber wnl"Version:"&.version wnl"SystemType:"&obj1.systemtype wnl"SystemStartupDelay:"&obj1.systemstartupdelay&"s" wnl"SystemStartupOptions:"&obj1.systemstartupoptions(0) fori=1toubound(obj1.systemstartupoptions) wnlspace(28)&obj1.systemstartupoptions(i) next endif endwith wnlvbcrlf&"ProcessorInfo:" wnl"NumberOfProcessors:"&obj1.numberofprocessors foreachobj3incol3 withobj3 wnl"DeviceID:"&.deviceid wnl"Name:"&.name wnl"CurrentClockSpeed:"&.currentclockspeed&"MHz" wnl"Description:"&.description ifviewtype=1then wnl"ExtClock:"&.extclock&"MHz" wnl"L2CacheSize:"&.l2cachesize&"KB" wnl"L2CacheSpeed:"&.l2cachespeed&"MHz" wnl"ProcessorId:"&.processorid wnl"Manufacturer:"&.manufacturer wnl"SocketDesignation:"&.socketdesignation wnl"AddressWidth:"&.addresswidth&"Bit" wnl"DataWidth:"&.datawidth&"Bit" endif endwith next withobj4 wnlvbcrlf&"MemoryInfo:" wnl"TotalPhysicalMemory:"&cint(.totalphysicalmemory/1024)&"MB" wnl"FreePhysicalMemory:"&cint(obj2.freephysicalmemory/1024)&"MB" ifviewtype=1then wnl"TotalPageFileSpace:"&cint(.totalpagefilespace/1024)&"MB" wnl"TotalVirtualMemory:"&cint(.totalvirtualmemory/1024)&"MB" wnl"AvailableVirtualMemory:"&cint(.availablevirtualmemory/1024)&"MB" endif endwith ifviewtype=1then wnlvbcrlf&"BIOSInfo:" wnl"Description:"&obj5.description wnl"CurrentLanguage:"&obj5.currentlanguage wnl"Version:"&obj5.version wnl"Manufacturer:"&obj5.manufacturer endif withobj6 wnlvbcrlf&"DisplayConfiguration:" wnl"Caption:"&.caption ifviewtype=1then wnl"DeviceName:"&.devicename wnl"DriverVersion:"&.driverversion endif wnl"DisplayFrequency:"&.displayfrequency&"Hz" wnl"BitsPerPel:"&.bitsperpel&"Bit" wnl"Pels:"&.pelswidth&"x"&.pelsheight endwith wnlvbcrlf&"DiskInfo:" foreachobj7incol7 withobj7 wnl"DeviceID:"&.deviceid wnl"Caption:"&.caption wnl"InterfaceType:"&.interfacetype ifviewtype=1then wnl"SCSIBus:"&.scsibus wnl"SCSILogicalUnit:"&.scsilogicalunit wnl"SCSIPort:"&.scsiport wnl"SCSITargetId:"&.scsitargetid wnl"SectorsPerTrack:"&.sectorspertrack&"KB" endif wnl"Partitions:"&.partitions wnl"Size:"&sizeformat(.size) endwith next str="Volume"+space(2)+"Type"+space(8)+"Format"+space(4) str=str+"Size"+space(6)+"Free"+space(12)+"Label" wnlstr foreachobj8incol8 withobj8 drivetype="" selectcase.drivetype case0 drivetype="Unknow" case1 drivetype="NoRootDir" case2 drivetype="Removable" case3 drivetype="Fixed" case4 drivetype="Network" case5 drivetype="CD-ROM" case6 drivetype="RAM" endselect strpercent="" if.size<>""and.freespace<>""then strpercent="("&formatpercent(.freespace/.size,0)&")" endif str=""&wsp(.caption,8)&wsp(drivetype,12)&wsp(.filesystem,10)&wsp(sizeformat(.size),10) str=str&wsp(sizeformat(.freespace)&strpercent,16)&.volumename wnlstr endwith next wnlvbcrlf&"NICInformaton:" foreachobj9incol9 withobj9 if.IPEnabledthen wnl"Index:"&.index wnl"Description:"&.description ifviewtype=1then wnl"DHCPEnabled:"&.dhcpenabled wnl"DHCPServer:"&.dhcpserver wnl"DNSHostName:"&.dnshostname wnl"DNSServerSearchOrder:"&wfl(.dnsserversearchorder) wnl"WINSPrimaryServer:"&.winsprimaryserver endif wnl"IPAddress:"&wfl(.ipaddress) wnl"MACAddress:"&.macaddress wnl"DefaultIPGateway:"&wfl(.defaultipgateway) wnl"IPSubnet:"&wfl(.ipsubnet) ifviewtype=1then wnl"IPFilterSecurityEnabled:"&.ipfiltersecurityenabled wnl"IPSecPermitIPProtocols:"&wfl(.ipsecpermitipprotocols) wnl"IPSecPermitTCPPorts:"&wfl(.ipsecpermittcpports) wnl"IPSecPermitUDPPorts:"&wfl(.ipsecpermitudpports) endif endif endwith next ifviewtype=1then wnlvbcrlf&"HotFixesInfo:" foreachobj10incol10 wnl"HotFixID:"&obj10.hotfixid wnl"FixComments:"&obj10.fixcomments wnl"InstallDate:"&obj10.installdate wnl"ServicePackInEffect:"&obj10.servicepackineffect next endif ifprogram=1then wnlvbcrlf&"Applications:" HKLM=&h80000002 keypath="SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" obj11.enumkeyHKLM,keypath,keyarray redimstr(ubound(keyarray)+1) j=0 fori=0toubound(keyarray) obj11.getstringvalueHKLM,keypath+keyarray(i),"displayname",strvalue ifstrvalue<>""then str(j)=strvalue j=j+1 endif next ifj>1then fori=0toj-1 fork=0toj-i-1 ifstrcomp(str(k),str(k+1),1)=1then strtemp=str(k+1) str(k+1)=str(k) str(k)=strtemp endif next next endif fori=0toj-1 wnl""&str(i) next endif subshowerr() iferr.numberthen wscript.echo"Error0x"&cstr(hex(err.number))&"." iferr.description<>""then wscript.echo"Errordescription:"&err.description&"." endif wscript.quit endif endsub subwnl(msg) wscript.echomsg ifisobject(of)then onerrorresumenext of.writelinemsg showerror() onerrorgoto0 endif endsub functionwfl(byrefobj) str="" fori=0toubound(obj) str=str&obj(i)&"" next wfl=str endfunction functionwsp(msg,num) ifmsg<>""then msg=left(msg,num-1) wsp=msg&space(num-len(msg)) else wsp=space(num) endif endfunction functiontimeformat(msg) timeformat=left(msg,4)&"/"&mid(msg,5,2)&"/"&mid(msg,7,2)&""&mid(msg,9,2)&":"&mid(msg,11,2)&":"&mid(msg,13,2) endfunction functionsizeformat(msg) ifmsg<>""then size=msg/1048576 ifsize>1024then sizeformat=round(size/1024,2)&"GB" else sizeformat=round(size,1)&"MB" endif endif endfunction functionobjget(msg) setcol=objswb.instancesof(msg) foreachobjxincol setobj=objx next setobjget=obj endfunction functionusage() wscript.echostring(79,"*") wscript.echo"RGISv1.03" wscript.echo"RemoteGetInfomationScript,byzzzEVAzzz" wscript.echo"Welcometovisite" wscript.echo"Usage:" wscript.echo"cscriptrgis.vbs[/rtargetIPusernamepassword][/ofilename][/v][/a][/h]" wscript.echo"/r:remotegetinfo." wscript.echo"/o:outputtofile." wscript.echo"/v:getmoreinfomation." wscript.echo"/a:getapplicationsinfomation." wscript.echo"/h:showusage." wscript.echostring(79,"*")&vbcrlf endfunction。