然而,在您发布程序集或二进制文件之前,您可以对它进行测试,以确定它是否被检测过。
However, before you ship an assembly or binary file, you can test it to determine whether it has been instrumented.
通过这些设置,您可以指定是否想要将检测后的二进制文件重新指定到另一个位置。
These Settings allow you to specify whether you want to relocate the instrumented binary to another location.
指定链接器应使用在运行检测的二进制文件后创建的配置文件数据来创建优化的映像。
Specifies that the linker should use the profile data created after running the instrumented binary to create an optimized image.
通过选择重新指定检测后的二进制文件的位置,原始二进制文件的副本将被检测,并放置到指定位置中。
By choosing to relocate the instrumented binary, a copy of the original binary is instrumented and put in the specified location.
不要将检测的二进制文件发送给客户。
这是经过检测的二进制文件,例如,用于启用代码覆盖率。
These are binary files that have been instrumented, for example, to enable code coverage.
如果这个程序的二进制文件经过了检测,则将收集代码覆盖率数据。
If the program's binaries are instrumented, code coverage data will be gathered.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
应用推荐