-
1 unmanaged code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime."تعليمات برمجية غير مُدارة -
2 unsafe code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime." -
3 master boot code
"A small amount of executable code contained in the master boot record that scans the partition table for the active partition, finds the starting sector of the active partition, loads a copy of the boot sector from the active partition into memory, and transfers control to the executable code in the boot sector." -
4 thunk
"To call 32-bit code from 16-bit code, or vice versa. Thunking involves, in large part, the translation to and from 16-bit segment offset memory addressing and 32-bit flat, or linear, memory addressing." -
5 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
6 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
7 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run." -
8 GDT
"A memory segment that contains descriptors for code, data, and descriptor table segments. All processor tasks have access to a common GDT." -
9 global descriptor table
"A memory segment that contains descriptors for code, data, and descriptor table segments. All processor tasks have access to a common GDT." -
10 kernel mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
11 Stop message
"A character-based, full-screen error message displayed on a blue background. A Stop message indicates that the Windows kernel detected a condition from which it cannot recover. Each message is uniquely identified by a Stop error code (a hexadecimal number) and a string indicating the errors symbolic name. Stop messages are usually followed by up to four additional hexadecimal numbers, enclosed in parentheses, which identify developer-defined error parameters. A driver or device may be identified as the cause of the error. A series of troubleshooting tips are also displayed, along with an indication that, if the system was configured to do so, a memory dump file was saved for later use by a kernel debugger." -
12 supervisor mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
13 protected mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
14 Ring 0
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
15 Windows Resume Loader
A utility that loads the executable code of a program into memory for execution after hibernation. -
16 profiling
"The collection of detailed performance data, such as memory, stack frame, and CPU utilization, during application execution. Analysis of the resulting data often leads to code optimizations that substantially improve application run-time behavior." -
17 control flow guard
A security feature that makes it more difficult to corrupt memory by implementing restrictions on where an application can execute code from.
См. также в других словарях:
Memory barrier — Memory barrier, also known as membar or memory fence or fence instruction, is a type of barrier and a class of instruction which causes a central processing unit (CPU) or compiler to enforce an ordering constraint on memory operations issued… … Wikipedia
Memory bandwidth — is the rate at which data can be read from or stored into a semiconductor memory by a processor. Memory bandwidth is usually expressed in units of bytes/second, though this can vary for systems with natural data sizes that are not a multiple of… … Wikipedia
Code 46 — film poster Directed by Michael Winterbottom Produced by … Wikipedia
Memory disambiguation — is a set of techniques employed by high performance out of order execution microprocessors that execute memory access instructions (loads and stores) out of program order. The mechanisms for performing memory disambiguation, implemented using… … Wikipedia
Code Age Commanders: Tsugu Mono Tsuga Reru Mono — Developer(s) Square Enix Publisher(s) Square Enix Director(s) … Wikipedia
Memory protection — is a way to control memory access rights on a computer, and is a part of most modern operating systems. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug… … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code of Personal Status (Tunisia) — The Code of Personal Status (CPS) (Arabic: مجلة الأحوال الشخصية) is a series of progressive Tunisian laws aiming at the institution of equality between women and men in a number of areas. It was promulgated by beylical decree on August 13, 1956… … Wikipedia
Memory ordering — is a group of properties of the modern microprocessors, characterising their possibilities in memory operations reordering. It is a type of out of order execution. Memory reordering can be used to fully utilize different cache and memory banks.… … Wikipedia
Memory management — is the act of managing computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and freeing it for reuse when no longer needed. This is critical to … Wikipedia
Memory segmentation — is the division of computer memory into segments or sections. Segments or sections are also used in object files of compiled programs when they are linked together into a program image, or the image is loaded into memory. In a computer system… … Wikipedia