• When would you pick a queue buffer before a stack buffer?

    什么情况下优先使用队列缓冲,而不是堆栈缓冲?

    youdao

  • You also can select the frame that you want to examine by right-clicking it in the stack buffer.

    可以stack buffer右键单击以选择查看frame

    youdao

  • What's likely to happen to new requests to an overloaded latency-sensitive service where data has backed up in a stack buffer? What about old requests?

    数据备份在堆栈缓冲区的低延迟服务过载时一个新的请求再来时,发生什么?旧的请求又会怎样

    youdao

  • This warning indicates that a parameter that points to a non-stack buffer of known size is being passed into a function that copies more bytes into it than that size.

    警告意味着,正将指向已知大小堆栈缓冲区参数传递某个函数但是该函数向缓冲区中复制字节数大于缓冲区的大小。

    youdao

  • Memory space breachAccomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.

    内存空间缺口——通过溢出缓冲区溢出错误来实现,以宿主进程权限执行攻击提供任何代码

    youdao

  • Because PHP manages memory for you, there's no PHP code that can result in stack and buffer overflow exploits.

    因为PHP可以管理记忆所以PHP代码不会导致堆栈缓冲溢出

    youdao

  • This protects against stack, buffer, and function pointer overflows, all without recompilation.

    这样将保护程序代码避免堆栈缓冲区函数指针溢出而且全都不需重新编译

    youdao

  • This buffer displays the call stack, with the current frame displayed in inverse video.

    这个buffer显示调用堆栈当前frame反色显示

    youdao

  • Another way in which buffer overflows cause security problems is through stack-smashing attacks.

    缓冲区溢位导致安全性问题另一个方法透过摧毁堆叠。

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • We'll go into the details of stack smashing in our third and fourth columns on buffer overflows.

    我们缓冲区溢位第三第四专栏中详细讨论堆叠的摧毁。

    youdao

  • In doing so, it triggers a series of buffer overflows allowing it to write various pieces of data and code to the stack.

    这样做,触发出一系列缓存溢出,以允许自己写入许多数据代码

    youdao

  • The most spectacular buffer overflows are stack smashes that result in a superuser, or root, shell.

    惊人的缓冲区溢位堆叠的摧毁,它会超级使用者root、shell 中造成后果。

    youdao

  • You can go up and down the stack using the toolbar or the GUD buffer. The source buffer updates accordingly, as does the locals buffer.

    可以使用工具GUDbuffer上下来回,源代码bufferlocals buffer也会相应更新

    youdao

  • Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on.

    缓冲区溢出主要分为堆栈溢出、溢出格式化字符串溢出

    youdao

  • Very long descriptors cause buffer overflows on the PS3, allowing code to be injected onto the stack and executed.

    非常长的描述会引起PS3缓存溢出,导致允许代码注入被执行

    youdao

  • Trace buffer doesn't save top of stack or contents of memory referenced by registers.

    跟踪缓冲区并不保存寄存器所指向内存内容

    youdao

  • On functions that the compiler recognizes as subject to buffer overrun problems, the compiler allocates space on the stack before the return address.

    对于编译认为容易出现缓冲区溢出问题函数,编译器将在堆栈返回地址之前分配空间

    youdao

  • A static buffer overrun occurs when a buffer declared on the stack is overwritten by copying data larger than the buffer.

    堆叠宣告缓冲区因为复制大于缓冲区的资料遭到覆写,就会发生静态缓冲区满溢。

    youdao

  • About 256k is allocated at once even if thread is idle - they are used by default thread stack, net buffer etc.

    大概需要立刻分配256k甚至线程空闲时—它们使用默认的线程堆栈网络缓存等。

    youdao

  • Is there any way to use buffer overflow and overwrite the stack, but to the LOWER MEMORY ADDRESSes?

    有没有办法利用缓冲区溢出改写堆栈低的内存地址?

    youdao

  • The first known PUBLIC description of buffer-overflows (" Smashing the stack for fun and profit ", by Aleph One) appeared here.

    第一次缓冲区溢出知名上市说明(“精彩有趣堆栈利润”,麻原彰晃)出现在这里

    youdao

  • If the protocol stack wants to update a register value because a write register function was received a buffer with the new register values is passed to the callback function.

    如果协议收到寄存器命令,将会执行寄存器更新操作,一个包含寄存器数值缓冲区传给回调函数。

    youdao

  • The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.

    大多数远程攻击利用缓冲区溢出技术进行特别是溢出。

    youdao

  • Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.

    二进制代码提升过程一些指令无法解析,甚至会出现跳转地址不合法之类结构性的错误使得后续分析精确性降低

    youdao

  • Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.

    二进制代码提升过程一些指令无法解析,甚至会出现跳转地址不合法之类结构性的错误使得后续分析精确性降低

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定