- Delta_Forth_1.4.zip
- Delta Forth
- bin
- DeltaForth.exe
- docs
- samples
- BuildSamples.bat
- Control Structures
- Begin-Again
- Begin-Until
- Begin-While-Repeat
- Case
- DoLoop
- IfElseThen
- General
- Constants
- Debugging
- Euclid
- GuessTheNumber
- Hanoi
- HelloWorld
- LeapYears
- Permutations
- PrimeNumbers
- Variables
- Library
- ForthLibrary
- Library1
- C#
- Forth
- Library2
- C#
- Forth
- source code
- dforthnet12.zip
- dforthnet12.exe
- dforthnet_demo.zip
- Delta Forth .NET
- bin
- DeltaForth.exe
- docs
- kb
- samples
- Control Structures
- Begin-Again
- Begin-Until
- Begin-While-Repeat
- Case
- DoLoop
- IfElseThen
- General
- Constants
- Euclid
- GuessTheNumber
- HelloWorld
- LeapYears
- PrimeNumbers
- Variables
- Library
- Library1
- C#
- Forth
- Library1.dll
- TestLibrary1.exe
- Library2
- C#
- Forth
- ForthLibrary.dll
- Library2.exe
- readme.txt
- dforthnet_source.zip
- Delta Forth .NET Sources
- dforthnet_src.zip
|
using System.Reflection;
using System.Runtime.CompilerServices;
//
// General Information about an assembly is controlled through the following
// set of attributes. Change these attribute values to modify the information
// associated with an assembly.
//
[assembly: AssemblyTitle("")]
[assembly: AssemblyDescription("")]
[assembly: AssemblyConfiguration("")]
[assembly: AssemblyCompany("")]
[assembly: AssemblyProduct("")]
[assembly: AssemblyCopyright("")]
[assembly: AssemblyTrademark("")]
[assembly: AssemblyCulture("")]
//
// Version information for an assembly consists of the following four values:
//
// Major Version
// Minor Version
// Build Number
// Revision
//
// You can specify all the values or you can default the Revision and Build Numbers
// by using the '*' as shown below:
[assembly: AssemblyVersion("1.0.*")]
//
// In order to sign your assembly you must specify a key to use. Refer to the
// Microsoft .NET Framework documentation for more information on assembly signing.
//
// Use the attributes below to control which key is used for signing.
//
// Notes:
// (*) If no key is specified, the assembly is not signed.
// (*) KeyName refers to a key that has been installed in the Crypto Service
// Provider (CSP) on your machine. KeyFile refers to a file which contains
// a key.
// (*) If the KeyFile and the KeyName values are both specified, the
// following processing occurs:
// (1) If the KeyName can be found in the CSP, that key is used.
// (2) If the KeyName does not exist and the KeyFile does exist, the key
// in the KeyFile is installed into the CSP and used.
// (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility.
// When specifying the KeyFile, the location of the KeyFile should be
// relative to the project output directory which is
// %Project Directory%\obj\<configuration>. For example, if your KeyFile is
// located in the project directory, you would specify the AssemblyKeyFile
// attribute as [assembly: AssemblyKeyFile("..\\..\\mykey.snk")]
// (*) Delay Signing is an advanced option - see the Microsoft .NET Framework
// documentation for more information on this.
//
[assembly: AssemblyDelaySign(false)]
[assembly: AssemblyKeyFile("")]
[assembly: AssemblyKeyName("")]
|
By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.
If a file you wish to view isn't highlighted, and is a text file (not binary), please
let us know and we'll add colourisation support for it.
I am a software engineer based in Timișoara, Romania and currently hold the position of software architect for one of the largest companies in the world.
I invented a dialect of the Forth programming language and implemented the first Forth compiler for the .NET platform. I reverse-engineered the communication protocol of some GPS trackers and wrote from scratch a vehicle tracking system that is currently used to track my two cars. I hold a PhD in computer science and I am the author of several papers and a book chapter. In the 90s I wrote several computer viruses in assembly language for my own research and I was the first to devise a technique to deter heuristic virus scanners. In short, a humble man.