Many of the crashes resulting from fuzz testing are direct results of memory allocation mistakes and buffer overflows.
由模糊测试导致的许多故障都是内存分配错误及缓冲器溢出的直接结果。
New tricks to counter buffer overflows.
防止缓冲区溢出的新技术。
In fact, buffer overflows are becoming more common.
事实上,缓冲区溢位正越来越普遍。
Common C and C + + mistakes that permit buffer overflows.
导致缓冲区溢出的常见c和C+ +错误。
Sort - Amount of heap used, overflows and sorts performed.
SORT——使用的堆、溢出和执行的排序的总数。
However, none of this lets developers ignore buffer overflows.
然而,没有哪种方法允许开发人员忽略缓冲区溢出。
But he is unique, a moderate who overflows with wonky plans.
但是,他是独一无二的,温和的,充满着靠不住的计划。
Some of these overflows have darkened the northwestern flanks.
一些泛滥出的泥浆已经将西北侧山麓染成黑色。
The last 10 years have seen more severe storms causing sewer overflows.
过去10年间,暴雨常引发下水道溢流。
Buffer overflows have been causing serious security problems for decades.
几十年来,缓冲区溢位一直引起许多严重的安全性问题。
Some languages have "escape" clauses that allow buffer overflows to occur.
有些语言存在允许缓冲区溢出发生的“转义”子句。
When the TB reaches its maximum value, it overflows and starts over from 0.
当TB达到自己的最大值时,就会溢出并从0重新开始。
We also only hinted at the nitty-gritty details of how stack overflows work.
而且,在此只有提到了堆叠溢位是如何产生的实质细节。
The quickly passing time overflows colorful is the life we are pursuing.
流光溢彩的年华才是我们追逐的生活。
Furthermore, tb_update_count is used to detect when the TB register overflows.
另外,tb_update_count还会用来检测tb寄存器何时会溢出。
Buffer overflows begin with something every program needs: a place to put bits.
缓冲区溢位开始于每个程序都需要的一些情况︰放置位元的空间。
On the outer loops of some curves, the river overflows onto nearby flood plains.
在弯的外沿,河水溢出,冲到附近的平原之上。
This prevents the server from doing added CPU and disk work if the buffer overflows.
这可防止在缓冲区溢出时服务器进行额外的CPU和磁盘工作。
Let's dig deeper into why some kinds of buffer overflows have big security implications.
让我们更深入地了解某些缓冲区溢位会造成严重安全性隐患的原因。
However, problems like urban runoff and sewer overflows continue to trouble local waterways.
尽管如此,诸如城市径流遭到污染以及污水外溢等问题仍然困扰着当地的河道。
This protects against stack, buffer, and function pointer overflows, all without recompilation.
这样将保护程序代码避免堆栈、缓冲区和函数指针溢出,而且全都不需重新编译。
Another way in which buffer overflows cause security problems is through stack-smashing attacks.
缓冲区溢位导致安全性问题的另一个方法是透过摧毁堆叠。
We'll go into the details of stack smashing in our third and fourth columns on buffer overflows.
我们将在缓冲区溢位的第三和第四专栏中详细讨论堆叠的摧毁。
Commonly, attackers exploit buffer overflows to get an interactive session (shell) on the machine.
一般地,攻击者利用缓冲区溢位得到机器上的交谈式Session (shell)。
This optimization transforms recursive calls into local loops, in order to prevent stack overflows.
这一优化将递归调用转换成本地回路,这样可以防止栈溢出。
Fortunately, the whole discussion of overflows does not apply to the hash index that I implemented.
幸运的是,针对溢出的全部讨论不会出现在我所实现的hash索引。
The most spectacular buffer overflows are stack smashes that result in a superuser, or root, shell.
最惊人的缓冲区溢位是堆叠的摧毁,它会在超级使用者或root、shell 中造成后果。
Buffer overflows cause many software weaknesses and, therefore, are the basis of malicious exploits.
缓冲区溢出导致许多软件出现漏洞,并因此为恶意开发提供了可乘之机。
If the sort will fit in memory, it will be very fast; otherwise, it overflows to disk and will be much slower.
如果排序可在内存中进行,它将非常快;否则,它会溢出到磁盘,而且慢得多。
In chart above, the number of vulnerabilities that can be directly attributed to buffer overflows is displayed.
以上图表中,显示了可以直接归为缓冲区溢位的弱点数。
应用推荐