hook function造句
例句與造句
- Demonstrates the c run - time debugging hook functions
說明c運行時調(diào)試掛鉤函數(shù)。 - Would cause the hook function to be called , the hook would in turn call
將導(dǎo)致調(diào)用掛鉤函數(shù),掛鉤函數(shù)則調(diào)用 - Debug hook function writing
編寫調(diào)試掛鉤函數(shù) - Calls hook function
調(diào)用掛鉤函數(shù)_ penter - The hook function uses
掛鉤函數(shù)使用 - It's difficult to find hook function in a sentence. 用hook function造句挺難的
- A client - dump hook function validates the birthday data and reports the contents of the client blocks
客戶端轉(zhuǎn)儲掛鉤函數(shù)驗證這些生日數(shù)據(jù)并報告client塊的內(nèi)容。 - This paper introduces hooks functions , types , procedure formats , and the installationmethod as well as a simple practical example
介紹了鉤子的功能、類型、鉤子過程的格式和安裝方法及一個簡單應(yīng)用實例 - The crt dbg2 sample illustrates several ways to use debugging hook functions with the debug versions of the c run - time library
Crt _ dbg2示例演示了幾種將調(diào)試掛鉤函數(shù)用于多種c運行時庫的調(diào)試版本的方法。 - Note that the allocation hook function explicitly excludes crt blocks the memory allocated internally by the c run - time library from its log
請注意,分配掛鉤函數(shù)將crt塊(由c運行時庫內(nèi)部分配的內(nèi)存)從其日志中顯式地排除。 - An allocation hook function logs heap operations to a text file , and the report hook function logs selected reports to the same text file
分配掛鉤函數(shù)將堆操作記錄到文本文件中,報告掛鉤函數(shù)將選定的報告記錄到同一文本文件中。 - Lists links to client block hook functions , allocation hook functions , allocation hooks and crt memory allocations , and report hook functions
列出指向客戶端塊掛鉤函數(shù)、分配掛鉤函數(shù)、分配掛鉤和crt內(nèi)存分配以及報告掛鉤函數(shù)的鏈接。 - Links you to debugging techniques for the c run - time library , including using the crt debug library , macros for reporting , differences between malloc and malloc dbg , writing debug hook functions , and the crt debug heap
鏈接到用于c運行時庫的調(diào)試技術(shù),包括:使用crt調(diào)試庫、用于報告的宏、 malloc和_ malloc _ dbg之間的差異、編寫調(diào)試掛鉤函數(shù)以及crt調(diào)試堆。 - Common network attacks such as ip spoofing , source route spoofing , icmp redirect deception and ip hijack are analyzed and protected by filter manage module . . ip hijack protection is implemented through injecting a hook function into protocol stack in detail
針對常見的ip地址欺騙、 ip源路由欺騙、 icmp重定向欺騙、 ip劫持等網(wǎng)絡(luò)攻擊給予了分析并在過濾管理模塊中給出了防御的方法,其中ip劫持防御是用一個鉤子函數(shù)注入?yún)f(xié)議棧中來實現(xiàn)的。 - Secondly , we implement a bpf model called mybpf on linux as a kernel module . it can collect packets within the netfilter frame , provide the applications with an interface in char device file manner and be attached to the nf _ ip _ pre _ routing hook defined by netfilter frame for ipv4 as a hook function . finally , we evaluate the performance between mybpf and other bpf on sock _ packet socket
該模塊以字符設(shè)備文件的形式為應(yīng)用程序提供接口,并在netfilter框架為ipv4定義的nf _ ip _ pre _ routing鉤子上掛接了一個鉤子函數(shù),該鉤子函數(shù)實現(xiàn)bpf虛擬機,完成對數(shù)據(jù)包的捕獲;最后,本文對mybpf模塊作了相應(yīng)的測試并與在sock _ packet套接口上實現(xiàn)的bpf做了性能比較。