您要查找的是不是:
- code execution simulator 代码执行模拟
- Fix for stack overflow vulnerability which could allow arbitrary code execution. 修复了一个可能导致执行任意代码的缓冲区溢出漏洞。
- The code executes up to the next breakpoint. 代码将执行到下一个断点。
- A line of code executed by a test. 由测试执行的一行代码。
- Buffer overrun code execute detected. 监测到缓存溢出代码执行。
- Stop the code execution, make modifications if necessary, and then retry the operation. 停止代码的执行,进行必要的修改,然后重试操作。
- A vulnerability involving the handling of downloads that can lead to automatic code execution. 一种涉及下载操作的漏洞,它可能导致自动的代码执行。
- The Construct method allows design-time code execution of the Page and UserControl controls. Construct方法允许Page和UserControl控件的设计时代码执行。
- Establishes a framework that helps enable cross-language integration, type safety, and high performance code execution. 建立一个支持跨语言集成、类型安全和高性能代码执行的框架。
- You can also trace code execution in an installed application, using methods of the Trace class. 类的方法来跟踪已安装的应用程序中的代码执行情况。
- At any point during code execution, a task can be described either as running, or waiting to run. 在执行代码期间的任意时间点,既可以将任务描述为正在运行,也可以将其描述为正在等待运行。
- With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity. 通过发送精心设计的请求包,攻击者可以执行任意代码,破坏其完整性。
- Establishes a Framework that enables cross-language integrations, type safety, and high performance code execution. 建立一个支持跨语言集成、类型安全并且拥有高效的代码执行效率的框架;
- You can then resume code execution and see the rest of the browser output up to the next breakpoint and the next until your PHP script has completed. 然后可以继续代码的执行并查看到下一断点之前的浏览器输出,然后再到下一个,直到PHP脚本完成。
- A filter is a piece of code executed before every action. 过滤器是在每个动作执行前执行的代码。
- To avoid this condition, stop code execution before adding a new distributed system diagram or before performing actions on the diagram. 若要避免发生这种情况,请在添加新的分布式系统关系图或在关系图上执行操作前,停止执行代码。
- The above scenario allows for arbitrary SMM memory overwrite (and later code execution of this arbitrary data written into SMM). 以上情况允许任意的SMM覆写(或者之后由运行的代码将任意的数据写入SMM)。
- These vulnerabilities could allow code execution if a user opened a specially crafted file used for streaming media in DirectX. 这次重要安全更新在窗口仁解决一个私下报告的弱点。
- This limitation applies because all CLR code execution freezes when a breakpoint is hit, and execution does not continue until the debugger advances from the breakpoint. 受到此限制的原因是,所有CLR代码执行在遇到断点时将冻结,执行不会继续,直到调试程序从断点继续前进。
- With a specially crafted request containing an overly long CD-key hash, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. 以特制的请求载有过长的CD-关键散列,远程攻击者可以导致执行任意代码造成的损失的完整性。
