Try to solve the problem of memory overflow.
尝试着解决内存溢出问题。
File Handle leaks or Memory Overflow perhaps, to take a stab in the dark.
文件句柄泄漏或内存溢出的可能,要在黑暗中刺。
And, searching for the function "gets" — a notoriously insecure string operation — can reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.
而根据veracode的Wysopal所说,搜索“gets ”函数——一个臭名昭著的不安全字符串操作——可以揭示很可能易受内存溢出攻击的程序。
B: When using high resolution images, the Print Preview will consume large resources and in some cases it will not even be usable because of low performance and memory overflow.
B:当使用高清晰度的图像时,打印预览将消耗大量资源,在某些情况下甚至会因为性能太低和内存溢出而无法使用。
This method avoids possible memory overflow problem in normal reuse distance analysis, at the same time this method makes complexity of reuse distance analysis decrease to linear.
该方法有效地避免了一般复用距离分析可能导致的内存溢出问题,同时使得复用距离分析达到线性时间复杂度。
The overflow buffer is used to satisfy peak memory requirements for any heap in the instance Shared memory region whenever a heap exceeds its configured size.
每当某个堆超出了其配置的大小时,便可以使用溢出缓冲区来满足实例共享内存区内任何堆的峰值需求。
Memory space breach — Accomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.
内存空间缺口——通过栈溢出、缓冲区溢出或堆错误来实现,以宿主进程的权限执行攻击者提供的任何代码。
MEMWATCH supports ANSI c, provides a log of the results, and detects double-frees, erroneous frees, unfreed memory, overflow and underflow, and so on.
MEMWATCH支持ANSIC,它提供结果日志纪录,能检测双重释放(double - free)、错误释放(erroneous free)、没有释放的内存(unfreed memory)、溢出和下溢等等。
This calculation can overflow, which leads to an improperly sized memory allocation. This results in a heap overflow.
这种计算可以溢出,从而导致不恰当的内存分配进而产生这将导致堆溢出。
Because PHP manages memory for you, there's no PHP code that can result in stack and buffer overflow exploits.
因为PHP可以为您管理记忆,所以PHP代码不会导致堆栈和缓冲溢出。
An overflow occurs when data is added to the buffer outside the block of memory allocated to the buffer.
溢出是指数据被添加到分配给该缓冲区的内存块之外。
In addition, DB2 will also allocate some additional memory for overflow buffer.
此外,DB 2还将为溢出缓冲区分配一些额外的内存。
Want to swim in the stacked memory, instant tears overflow.
念想畅游于层叠的记忆里,一瞬之间泪水泛滥。
The module can detect memory leak, write overflow, free wild pointer and mismatch using of memory functions of the executable files.
可以检测内存泄漏、内存写溢出、释放野指针和内存管理函数的不匹配等问题。
Is there any way to use buffer overflow and overwrite the stack, but to the LOWER MEMORY ADDRESSes?
有没有办法利用缓冲区溢出和改写堆栈,但较低的内存地址?
The C language allows indirect access memory location by pointer without boundary check, which may cause buffer overflow.
由于C语言允许通过指针进行间接内存访问,但并不进行边界检查,因此可能存在缓冲区溢出。
When the last header is handled, the buffer overflow occurs and the memory after the 0x2000 bytes buffer is overwritten with the content of the last header.
当最后的头球攻门,处理,和记忆缓冲区溢出发生在0x2000字节缓冲区的内容覆盖的最后的标题。
When the last header is handled, the buffer overflow occurs and the memory after the 0x2000 bytes buffer is overwritten with the content of the last header.
当最后的头球攻门,处理,和记忆缓冲区溢出发生在0x2000字节缓冲区的内容覆盖的最后的标题。
应用推荐