• In this particular program, doing buffer handling in this way does not affect the execution time significantly, and in some data sets, affects it negatively.

    这个程序中,这种方式执行缓冲区处理并不显著影响执行时间对于某些数据可能有消极影响

    youdao

  • This error occurs if a program passes an invalid pointer value or if the length of the buffer is too small.

    如果程序传递了无效指针或者如果缓冲区长度太小会发生错误

    youdao

  • Buffer overflows begin with something every program needs: a place to put bits.

    缓冲区开始每个程序都需要一些情况︰放置位元的空间

    youdao

  • The simplest usage is to have the SPE program take two Pointers: one for an input buffer and one for an output buffer.

    简单的用法SPE程序使用两个指针用于输入缓冲区,另外一个用于输出缓冲区。

    youdao

  • The SPE program reads in the input buffer, processes the data, and then writes it to the output buffer.

    SPE程序输入缓冲区读取数据然后数据进行处理,再将结果写入输出缓冲区中。

    youdao

  • If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.

    如果攻击能够导致缓冲区溢出那么它就控制程序中的其他

    youdao

  • The kernel ring buffer is also used for some events after the system is booted. These include certain program failures and hot-plug events.

    系统启动内核缓冲区可以用于一些事件其中包括某些程序失败热插拔事件。

    youdao

  • The example program would benefit from such enhancements as keeping the buffers synchronized or checking if the complete buffer must be redrawn when contents are lost.

    示例程序受益于一些增强功能使缓冲区保持同步或者检查内容丢失时是否必须重新绘制整个缓冲区

    youdao

  • Likewise, when a buffer overflows, the excess data may trample on other meaningful data that the program might wish to access in the future.

    同样地缓冲区溢位时额外资料摧残程序将来可能存取其它有用的资料。

    youdao

  • For instance, a program designed to exploit a buffer overflow is very likely to use some inline assembly for the target platform.

    举例来说,设计利用缓存溢出程序可能目标平台使用内联汇编

    youdao

  • In the sample program, event data is always read with a buffer of 4k.

    示例程序中,总是4k缓冲区读取事件数据

    youdao

  • In the worst cases, a program may be overflowing a buffer and not showing any adverse side effects at all.

    坏的情况程序可能正发生缓冲区位,但根本没有任何副作用的迹像。

    youdao

  • The example program purposely does not synchronize buffers by remembering what wasn't drawn to the current bufferletting you see multiple buffers at work more clearly.

    示例程序通过记住什么东西没有绘制当前缓冲区有意让缓冲区同步—以便清楚地了解同时工作多个缓冲区

    youdao

  • In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    youdao

  • You could even just use a single pointer and write data back into the buffer you got it from, although this might be a nuisance to program for on the other end.

    甚至只需要使用一个指针数据回到读取数据所使用的缓冲区中即可,不过对于另外一端的编程来说可能有些麻烦。

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • This puts all of the transferring logic into the MFC, and leaves your program free to do other computational tasks while the buffer waits for new data.

    这会所有传输逻辑全部放入 MFC 中,程序可以缓冲区等待数据的同时自由执行其他计算任务

    youdao

  • Looking at the program, it is also easier for an attacker to figure out how to cause a buffer overflow with real inputs.

    检视这个程序攻击者容易得出如何利用实际输入导致缓冲区溢位

    youdao

  • Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.

    任何允许外部实体输入数据程序容易受到恶意的攻击,例如缓冲区溢出嵌入式控制字符

    youdao

  • The output of each program is then pasted back into the buffer, replacing the original contents.

    然后每个程序输出粘贴缓冲区替换原有内容

    youdao

  • For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.

    例如外部使用者可以利用网路伺服器程序中的缓冲区溢位可能使攻击登入机器。

    youdao

  • Donors are committed to expanding the program to new areas made available by the recent revision of the buffer zone.

    捐助机构承诺方案扩大最近缓冲区修改后腾出的新区

    youdao

  • A common cracking technique is to find a buffer overflow in an suid root program, and then exploit the buffer overflow to snag an interactive shell.

    常用的破坏技术suidroot程序寻找缓冲区位,然后利用缓冲区溢偷取交谈式shell。

    youdao

  • The sample program does not check for EVENT_OVERFLOW since it specifies an INFO_LVL of 1 and USES the default buffer size of 4k.

    示例程序并不检查EVENT_OVERFLOW,因为指定info_lvl为1使用默认缓冲区大小4k

    youdao

  • A buffer overflow in a program such as find is likely to be a risk to a great number of systems.

    诸如find这样的程序中的缓冲区溢出可能大量的系统带来风险。

    youdao

  • But as a result, the buffer is never released because it is always reachable by the program (unless the LeakyChecksum object is garbage collected).

    但是结果缓冲区永远不会被释放因为程序来说总是(除非leakychecksum对象垃圾收集了)。

    youdao

  • If the program USES the resulting data anyway, an attacker will try to fill up the buffer so that when the data is truncated, the attacker will fill the buffer with what the attacker wanted.

    如果程序无论如何还是使用结果数据,那么攻击尝试缓冲区以便在数据截断使用他希望的任何内容填充缓冲区。

    youdao

  • Fundamentally, any time your program reads or copies data into a buffer, it needs to check that there's enough space before making the copy.

    从根本上讲,在程序数据读入复制缓冲区中的任何时候需要复制之前检查是否足够空间

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • Depth texture corresponds to Z buffer contents that are rendered, it does not use the result from the fragment program.

    深度纹理对应Z缓冲区渲染的内容并不使用片段程序所输出结果

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定