-
1 EXECUTABLE CODE
-
2 master boot code
"A small amount of executable code contained in the master boot record that scans the partition table for the active partition, finds the starting sector of the active partition, loads a copy of the boot sector from the active partition into memory, and transfers control to the executable code in the boot sector." -
3 exit code
A value set by an executable upon exit or termination that conveys status information. -
4 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
5 master boot record
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
6 MBR
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
7 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run." -
8 Windows Resume Loader
A utility that loads the executable code of a program into memory for execution after hibernation. -
9 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
10 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
11 fault injection
"A technology allowing users to inject faults into an executable without requiring rebuilding the binary or modifying the source code; thus, providing a means of simulating errors and testing recovery."إقحام/إدخال الخطأ -
12 script injection attack
"An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code."
См. также в других словарях:
executable code — noun Instructions for a computer in a form the computer can directly use (i.e. which it can execute). Derived from source code by compiling or assembling and linking … Wiktionary
executable code — /ɛksəˈkjutəbəl koʊd/ (say eksuh kyoohtuhbuhl cohd) noun Computers a machine language which can be interpreted and acted upon by a specific piece of hardware. Compare source code, machine language …
Executable code — Рабочая программа … Краткий толковый словарь по полиграфии
Executable compression — is any means of compressing an executable file and combining the compressed data with the decompression code it needs into a single executable.Running a compressed executable essentially unpacks the original executable code, then transfers… … Wikipedia
executable — /ɛksəˈkjutəbəl/ (say eksuh kyoohtuhbuhl) adjective 1. that can be executed or carried out. 2. Computers of or relating to a version of an application that can be directly read by a computer: executable code. –noun 3. Computers (plural) the… …
Executable UML — Executable UML, often abbreviated to xtUML [Example usage: http://www.techonline.com/community/tech topic/37519] or xUML [Example usage: http://www.kc.com/xuml.php] , is the evolution of the Shlaer Mellor method to UML. Executable UML graphically … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Executable And Linking Format — ELF (Executable and Linking Format) est un format de fichier informatique binaire utilisé pour l enregistrement de code compilé (objets, exécutables, bibliothèques de fonctions). Il a été développé par l’USL (Unix System Laboratories) pour… … Wikipédia en Français
Executable and Linkable Format — Executable and Linking Format ELF (Executable and Linking Format) est un format de fichier informatique binaire utilisé pour l enregistrement de code compilé (objets, exécutables, bibliothèques de fonctions). Il a été développé par l’USL (Unix… … Wikipédia en Français
Executable and Linking Format — Extension aucune, .o, .so, .exe, .elf Développé par Unix System Laboratories Type de format Format de fichier exécutable Spécification Format ouvert … Wikipédia en Français
Executable and linking format — ELF (Executable and Linking Format) est un format de fichier informatique binaire utilisé pour l enregistrement de code compilé (objets, exécutables, bibliothèques de fonctions). Il a été développé par l’USL (Unix System Laboratories) pour… … Wikipédia en Français