举例来说,设计利用缓存溢出的程序很可能会对目标平台使用内联汇编。
For instance, a program designed to exploit a buffer overflow is very likely to use some inline assembly for the target platform.
非常长的描述会引起PS3缓存溢出,导致允许代码注入栈并被执行。
Very long descriptors cause buffer overflows on the PS3, allowing code to be injected onto the stack and executed.
这样做,它触发出一系列的缓存溢出,以允许自己向栈写入许多数据和代码。
In doing so, it triggers a series of buffer overflows allowing it to write various pieces of data and code to the stack.
漏洞攻击开发出来后,您可以确定您的应用程序和系统是否能够经受缓存溢出等攻击和SQL注入等漏洞的威胁。
After developing exploits, you can determine whether your applications and systems are vulnerable to exploits such as buffer overflows and holes such as SQL injections.
memcpy加入到strcpy,strncpy,strcat,strncat等常用函数的队伍中,都是由于可通过缓存溢出进行安全攻击而被禁用。
Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.
发生内存溢出在大多数情况下是因设计问题引起的,太多的内存存储在缓存或Session中。
Most of the time when an Out Of Memory exception occurrs it is caused by a design problem, where either too much memory is stored in cache or session scope.
没有磁盘溢出,因此,1000也是缓存的最大长度。
There is no overflow to disk, so 1000is also the maximum cache size.
没有磁盘溢出,因此,1000也是缓存的最大长度。
There is no overflow to disk, so 1000 is also the maximum cache size.
没有磁盘溢出,因此,1000也是缓存的最大长度。
There is no overflow to disk, so 1000 is also the maximum cache size.
应用推荐