碼溢出 的英文怎麼說
中文拼音 [mǎyìchū]
碼溢出
英文
code overflow-
According to research of redundant signed digit ( rsd ) calibration theory of pipelined adc, a novel out of range detection rsd technique is provided. when input signal is out of the adc ’ s range, the technique can detect this situation and the wrong output word is avoided
然後,在深入分析冗餘位演算法的基礎上,提出了新型的校正演算法,針對傳統演算法不能判斷信號超出adc處理范圍的不足,增加了溢出判斷功能,既能有效校正比較器的失調,又防止了信號溢出時的誤碼輸出,保證了系統的性能。Microsoft has released a patch that eliminates a security vulnerability affecting customers using microsoft windows 2000. the vulnerability could allow enable a malicious user to potentially run code on another users machine
如果用心不良用戶在電子郵件中發送某個調用activex控制項的url ,它可以利用此漏洞並通過緩沖區溢出使代碼運行。Last, i give some examples on how to write exploit programs after finding vulnerabilities. i also introduce a new exploit method : exploit based on software signal
最後就如何編寫通用的緩沖區溢出代碼進行了分析和舉例,還介紹了一種新的攻擊手段,基於信號量的攻擊。H. 26l / h. 264 is a new video compression standard provided by itu - t and iso / iec, which faces to very low rate video communication. it uses a new dct transform method as 4 * 4 integer dct. it can reduce block effect, while it is clear and easy to realizen, has high precision, computes fast and costs less memory
H . 26l / h . 264是itu - t與iso / iec聯合提出的一種較新的面向甚低碼率視頻通信應用的視頻圖像壓縮標準,採用了一些新的編碼技術,使用了新的dct變換方法: 4 4整型dct變換,該變換具有減小方塊效應,演算法明晰簡單、易於實現,運算結果精度高且不會溢出,運算速度快,佔用內存小等優點。Buffer overrun code execute detected
監測到緩存溢出代碼執行Buffer overrun code execute detected. this behaviour is typical of some malicious programs
檢測到正在執行緩存溢出代碼。該行為是典型的危險程序。Unnecessary services can be used by an outside attacker to execute code on the server, such as by using buffer overflows see
外部攻擊者可以利用不必要的服務在服務器上執行代碼,比如通過緩存溢出(參見Buffer overruns using out - of - range index or offset values are one common example of this type of attack, as are any parameters that might exploit a bug in the underlying code
此類攻擊的一個常見示例是使用超出范圍的索引值或偏移量值的緩沖區溢出,就像任何可能利用基礎代碼中的bug的參數一樣。Several mechanisms are provided to assure the system security based on the ultrakernel. separation, multilevel, hardware based access control and code error tolerance mechanisms are well integrated. ( 3 ) a developing platform and a firewall system prototype
整體採用可生存設計;在系統設計時加入了抗緩沖區溢出攻擊機制和對抗dos攻擊機制;設計了一種容忍代碼錯誤的機制,另外還採用隔離與分級機制,並對blp模型進行改進應用。Common coding errors reported by the tool include buffer overrun, un - initialized memory, null pointer dereference, memory and resource leaks
工具報告的常見編碼錯誤包括緩沖區溢出、內存未初始化、空指針取消引用以及內存和資源泄漏。Code analysis tool detects common coding errors, such as buffer overrun, un - initialized memory, null pointer dereference, and memory and resource leaks
代碼分析工具用於檢測常見的編碼錯誤,例如緩沖區溢出、內存未初始化、空指針取消引用,以及內存和資源泄露。Ms03 - 036 : buffer overrun in wordperfect converter could allow code execution 827103
Ms03 - 036 : wordperfect轉換器存在的緩沖區溢出問題可能會使任意代碼都能運行( 827103 )This compiler option which is not enabled by default activates code analysis that reports potential security issues such as buffer overrun, un - initialized memory, null pointer dereferencing, and memory leaks
此編譯器選項(默認情況下不啟用)激活代碼分析,此分析報告潛在的安全問題,例如緩沖區溢出、未初始化的內存、空指針取消引用和內存泄漏等。Presents platform sdk recommendations about privileges, buffer overruns, discretionary access control lists dacls, and passwords
介紹有關的platform sdk建議,包括特權、緩沖區溢出、任意訪問控制列表( dacl )和密碼。One of the most significant aspects is that the combination of strict type checks, array bounds checking, and automatic garbage collection thoroughly blocks the most destructive forms of server code vulnerabilities : buffer overruns, double - release errors, and rogue pointers
最顯著的方面之一是嚴格的類型檢查、數組邊界檢查和自動垃圾收集的組合徹底防止了最具破壞性形式的服務器代碼攻擊:緩沖區溢出、重復釋放的錯誤和游離的指針。Fix for stack overflow vulnerability which could allow arbitrary code execution
修復了一個可能導致執行任意代碼的緩沖區溢出漏洞。This exception indicates an internal buffer has overflowed and users should take appropriate steps in their code to ensure it recovers properly
此異常指示內部緩沖區已溢出,用戶應在其代碼中採取適當的步驟以確保內部緩沖區正常恢復。Three means exists in current defencing the overrun of stack : overwriting contents in stack with too long arguments is not allowed ; overwriting is allowed but unauthorized change of control flow is not allowed ; change of control flow is allowed but execution of injected code is prevented
在理論上存在三類方法檢測堆棧溢出:不允許用超長的輸入參數覆蓋返回地址;允許返回地址被覆蓋,但不允許控制流轉向非授權的用戶;允許控制流轉向非授權的用戶,但不允許其可執行代碼被運行。This compiler option which is on by default, instructs the compiler to inject overrun detection code into functions that are at risk of being exploited
此編譯器選項(默認情況下處于打開狀態)指示編譯器將溢出檢測代碼插入到面臨被利用的風險的函數中。Fortunately, most people who find serious security flaws don t use their finds to do bad things
可以利用堆棧溢出使程序跳轉至利用代碼,該代碼被放置在堆上。分享友人