executable instruction 中文意思是什麼

executable instruction 解釋
可執行指令
  • executable : adj. 可執行的,可實行的,可以作成的。
  • instruction : n. 1. 教育,教導。2. 教訓,教誨。3. 〈 pl. 〉 指令,訓令,指示,細目。
  1. The addr2line tool which is part of the standard gnu binutils is a utility that translates an instruction address and an executable image into a filename, function name, and source line number

    Addr2line工具(它是標準的gnu binutils中的一部分)是一個可以將指令的地址和可執行映像轉換成文件名、函數名和源代碼行數的工具。
  2. Provides an overview of the two basic units of instruction in jscript, declaration statements and executable statements

    提供有關jscript中的兩個基本指令單元(聲明語句和可執行語句)的概述。
  3. Provides an overview of the two basic units of instruction in visual basic : declaration statements and executable statements

    提供有關visual basic中的兩個基本指令單元(聲明語句和可執行語句)的概述。
  4. The breakpoint is set at the next executable instruction in the function call

    在函數調用中的下一個可執行指令處設置斷點。
  5. The key work performed in this stage is to determine which bytes of the binary hold executable instruction and which hold data

    這個階段要做的主要工作是確定二進制代碼中哪些位元組是可執行指令、哪些是數據。
  6. If class load, module load, and thread start events are ignored as they are by default, the program stops on the first executable instruction of the main thread

    如果忽略類加載、模塊加載和線程啟動事件(默認情況下如此) ,程序將在遇到主線程的第一條可執行指令時停止。
  7. When you view the breakpoint properties, this breakpoint appears as an address breakpoint with a memory location corresponding to the next executable instruction in the function

    查看斷點屬性時,該斷點顯示為一個地址斷點,這個地址斷點具有一個與函數中下一個可執行指令相對應的內存位置。
  8. If cordbg. exe is ignoring class load, module load, and thread start events as it is by default, the program stops on the first executable instruction of the main thread

    如果cordbg . exe忽略類加載、模塊加載和線程啟動事件(默認情況下如此) ,程序將在遇到主線程的第一條可執行指令時停止。
  9. Is recorded so that the instruction stream can be patched if necessary when persisting the module to a portable executable

    的位置,以便在將模塊持續到可移植可執行文件( pe )時可以對指令流進行必要的修補。
  10. Is recorded so that the instruction stream can be patched if necessary when persisting the module to a portable executable file

    的位置,以便在將模塊持續到可移植可執行文件時可以對指令流進行必要的修補。
  11. What this means is that in order to detect an inline function hook you need to scan, more or less, the entire range of executable kernel memory and look through each unconditional jump instruction

    這意味著,為了檢測一個內嵌函數掛勾,你得搜索,或多或少,可執行內核內存的整下區域來查看每一個無條件跳轉指令。
分享友人