緩沖溢出 的英文怎麼說

中文拼音 [huǎnchōngchū]
緩沖溢出 英文
buffer overflow
  • : Ⅰ形容詞1 (遲; 慢) slow; unhurried 2 (緩和; 不緊張) not tense; relaxed Ⅱ動詞1 (延緩; 推遲) d...
  • : Ⅰ動詞(充滿而流出來) overflow; spill Ⅱ形容詞(過分) excessive
  • 溢出 : overflow; spill over; runoff; runout; transfluence; spilth; superfusion
  1. Under certain circumstances, a very long field embedded in a clip art. cil file could cause a buffer overrun in the clip gallery software

    在某些情況下,內嵌于剪貼畫. cil文件內的一個非常長的欄位可能在「剪輯圖片庫」軟體中導致
  2. A buffer overrun can overwrite these parameters

    可以改寫這些參數。
  3. " the most frequent attack path hackers use to get into systems is to use stack overflows, buffer overflows, and memory overflows

    「黑客用來闖入系統最常見的攻擊方法是使用堆棧和內存
  4. Microsoft has released a patch that eliminates a security vulnerability affecting customers using microsoft windows 2000. the vulnerability could allow enable a malicious user to potentially run code on another users machine

    如果用心不良用戶在電子郵件中發送某個調用activex控制項的url ,它可以利用此漏洞並通過使代碼運行。
  5. Cg5 : clip art buffer overrun vulnerability patch

    Cg5 :剪貼畫缺陷修補程序包
  6. We ve implied that some crackers can be hackers

    )已被用來查找可能的脆弱性。
  7. Last, i give some examples on how to write exploit programs after finding vulnerabilities. i also introduce a new exploit method : exploit based on software signal

    最後就如何編寫通用的代碼進行了分析和舉例,還介紹了一種新的攻擊手段,基於信號量的攻擊。
  8. Buffer overflow checking is now on by default

    檢查功能現在默認為打開狀態。
  9. Buffer overruns using out - of - range index or offset values are one common example of this type of attack, as are any parameters that might exploit a bug in the underlying code

    此類攻擊的一個常見示例是使用超范圍的索引值或偏移量值的,就像任何可能利用基礎代碼中的bug的參數一樣。
  10. However, with many burst traffic simultaneously arriving at a node, the queue length may become larger and buffer overflow in a moment, or high - speed link is emerged into slower one, there will be in congestion

    然而,當多個突發業務同時到達一個節點時,存隊列長度迅速增加,在極短的時間內緩沖溢出,或高速鏈路接入慢速網路中引起輸入鏈路速率大於輸鏈路速率,則導致網路擁塞。
  11. Windows 2000 security patch : attack ep vulnerability

    Windows 2000安全修補程序:通訊簿服務漏洞
  12. The callee must take the necessary precautions to ensure that the buffer is not overrun

    。被調用方必須採取必要措施確保區不
  13. Several mechanisms are provided to assure the system security based on the ultrakernel. separation, multilevel, hardware based access control and code error tolerance mechanisms are well integrated. ( 3 ) a developing platform and a firewall system prototype

    整體採用可生存設計;在系統設計時加入了抗攻擊機制和對抗dos攻擊機制;設計了一種容忍代碼錯誤的機制,另外還採用隔離與分級機制,並對blp模型進行改進應用。
  14. According to the systematical research on those, at present, commonly adapted attacking and intrusion means, it analyzes and studies all those active approaches, like electronic frauds, scanning loopholes, overflowing buffer area, dos and ddos, etc

    對目前較為流行的攻擊方式與入侵方法進行了系統的研究,分析研究了電子欺騙、漏洞掃描、、 dos及ddos等主動攻擊方法。
  15. Specifies that an exception appropriate to the condition, such as out of memory, buffer overflow, and so forth, be thrown

    指定引發相應于該條件的異常,如內存不足、等。
  16. Often, simply trying to explain the gist of a security problem isn t enough to help a developer

    我們還討論了可幫助使您的程序安全遠離可怕的的幾個工具。
  17. Common coding errors reported by the tool include buffer overrun, un - initialized memory, null pointer dereference, memory and resource leaks

    工具報告的常見編碼錯誤包括、內存未初始化、空指針取消引用以及內存和資源泄漏。
  18. Code analysis tool detects common coding errors, such as buffer overrun, un - initialized memory, null pointer dereference, and memory and resource leaks

    代碼分析工具用於檢測常見的編碼錯誤,例如、內存未初始化、空指針取消引用,以及內存和資源泄露。
  19. The device response caused buffer overflow

    驅動器響應導致
  20. The device re o e caused buffer overflow

    驅動器響應導致
分享友人