Examples of using Process memory in English and their translations into Russian
{-}
-
Official
-
Colloquial
Configure the process memory protection settings.
Kaspersky Security 10.1 forWindows Server saves and applies the configured process memory protection settings.
Generate process memory dump- to generate and download the dump of the specified application see the figure below.
A remote attacker can potentially take advantage of this flaw to cause disclosure of information from process memory.
You can protect process memory from exploits using an Agent injected into the process. .
Configure the Exploit Prevention mode and set up preventing actions see Section"Configuring process memory protection settings" on page 94.
Configuring process memory protection settings To add a process to the list of protected processes. .
Select exploit prevention mode and actions to reduce exploit impact see section"Configuring process memory protection settings" on page 148.
Memory Limit: The maximum amount of process memory usage in kilobytes(KB) before the process is recycled.
Stefan Esser discovered a type confusion issue affecting phpinfo(),which might allow an attacker to obtain sensitive information from process memory.
For example, using SQLite locally andPostgreSQL in production; or local process memory for caching in development and Memcached in production.
An attacker can send a crafted message that crash to component causing a denial of services ordisclosure of information from process memory.
The use of VirtualAlloc/VirtualFree and SEH based memory manager makes it possible to use process memory more effectively and decreases its fragmentation.
Multics implemented a single-levelstore for data access, discarding the clear distinction between files(called segments in Multics) and process memory.
It contains selected data records:full or partial(filtered) process memory; list of the threads with their call stacks and state(such as registers or TEB); information about handles to the kernel objects; list of loaded and unloaded libraries.
An attacker may use this flaw to perform denial of service attacks,disclose worker process memory, or possibly execute arbitrary code.
After the Kaspersky Security Broker Host Service is stopped, Kaspersky Security 10.1 for Windows Server continues to protect processes added to the protected process list, is also loaded in newly-added processes, andapplies all available impact reduction techniques to protect process memory.
Multiple security issues have been found in the JBIG2 decoder library,which may lead to denial of service, disclosure of sensitive information from process memory or the execution of arbitrary code if a malformed image file(usually embedded in a PDF document) is opened.
A remote attacker could exploit this issue via a specially crafted DNS request to cause dnsmasq to crash, orpotentially to obtain sensitive information from process memory.
An information disclosure vulnerability was discovered in the Service Discovery Protocol(SDP) in bluetoothd,allowing a proximate attacker to obtain sensitive information from bluetoothd process memory, including Bluetooth encryption keys.
Security continues to protect processes added to the protected process list, is also loaded in newly-added processes, andapplies all available impact reduction techniques to protect process memory.
Protect processes memory from exploitation of vulnerabilities in the mode.
The course will survey psychological approaches to politics, examining psychological research on attitudes, personality, emotion,group processes, memory, cognition, and decision making.
The main drawback of older technologies is that the Virtual Dedicated Server acts as an enhanced chroot, where the memory is allocated to all users at once, that is there is no dedicated virtual memory, andthere are problems with processes, memory, software, and many other.
As a result, suffer mental processes, memory, attention, intellect, imagination, thought, speech.
There are two types of Nodes:Device Node Execution Environment Node Device nodes are physical computing resources with processing memory and services to execute software, such as typical computers or mobile phones.
To design the interaction of processes, memory allocation and management of resources of embedded systems in real time.
Studies now show that as people age, their process of memory retrieval changes.
This makes post-hypnotic amnesia similar to psychogenic amnesia as it disrupts the retrieval process of memory.
The win32ps extension is a Windows specific extension that allows PHP retrieve statistics about process and memory utilization.