Примеры использования Executable code на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Executable code online analysis technologies.
Does your operating system convert to executable codes?
So, the executable code now looks in the following way.
After this, the pseudocode transforms into executable code.
Usually is affects the executable code of the application.
The executable code is encrypted and digitally signed before it is shipped.
These Terms of Service apply to the executable code version of Google Chrome.
Make sure that the comment system you choose blocks any executable code.
Fully encrypt the executable code of your software against reverse engineering.
It did so by purchasing one in order to decompile the executable code of three Genesis games.
If the formal specification is in an axiomatic semantics, the preconditions andpostconditions of the specification may become assertions in the executable code.
BYTE: Do you obtain any rights over the executable code derived from the C compiler?
For other things there's no such distinction as between source code and executable code.
A compiler capable of creating an executable code for a platform other than the one on which the compiler is running.
After the application software has been completed and is ready for release, the executable code is encrypted.
A cross compiler is a compiler capable of creating executable code for a platform other than the one on which the compiler is running.
One of the major achievements in software protection against hacking is a closer integration of the protection functions with the executable code of the application.
The compiler can be operated from, and generate executable code for, the DOS, OS/2, Windows, Linux operating systems.
This runs analysis of the operating system and installed applications, except for temporary files andresource dynamic link libraries that contain executable code.
There are formats that contain orcan contain executable code, for instance. exe,. dll,. doc.
The eXtended Memory Specification or XMS is the specification describing the use of IBMPC extended memory in real mode for storing data but not for running executable code in it.
Devices may have an on-board ROM containing executable code for x86 or PA-RISC processors, an Open Firmware driver, or an EFI driver.
At the same time, there are formats that contain ormay contain an executable code such as. exe,. dll,. doc.
The Enigma Protector encrypts and compresses the executable code and application data so that changing them without destroying the protection turns impossible.
A non-executable stack can prevent some buffer overflow exploitation,however it cannot prevent a return-to-libc attack because in the return-to-libc attack only existing executable code is used.
Files of all variety ranging from PDF's to JPEGS,. DOC's,. JS,. JAR andmany more are capable of carrying executable codes that can breach your network, do damage to your system, put your identity and location at risk.
The essence of the Virtual Machine technology is that the executable code is translated into a special PCODE language which can be read only by the Enigma Protector, and is subsequently executed in the internal CPU emulator.
In this paper, we demonstrate how Nested Petri net formalism can be applied to model search-and-rescue coordination systems andautomatically generate implementation in the form of the executable code for event-driven systems based on the Telegram platform.
Regardless of whether your software is Java-based or programmed in. NET, the executable code on the server is encrypted using AxProtector to prevent pirate copies and reverse engineering.
These include various copyrights in Nintendo's software source code, executable code, game visual display, game music, game characters, product packaging, game manuals and labels, hardware chip microcode, artwork and publications.