Error code message , will know defective position . also can use test card port 80h 300h for software program check point display 開(kāi)機(jī)測(cè)試完畢后,可利用本卡port 80h 300h當(dāng)做其他軟體檢查點(diǎn)顯示
Your e - mail program checks the e - mail addresses of your message recipients using one or more directory service address lists 電子郵件程序使用一個(gè)或多個(gè)目錄服務(wù)地址列表檢查郵件收件人的電子郵件地址。
Use two pieces debuggers to compare mother board circuit signals for repairing . software debug : use cv - 30 i o port 80h , 300h for software program check point display , 可兼做軟體除錯(cuò)使用:利用本卡i o port 80h , 300h當(dāng)作檢查點(diǎn)check point
It is a dramatic change in the philosophy of updates , usually every installed program checks periodically and when a new version is available downloads it 這是更新原理的一個(gè)重大改變.通常程每隔一段時(shí)間檢查更新,當(dāng)發(fā)現(xiàn)新版本時(shí)下載安裝
You specify that the setup program check whether this component is installed on the target computer and install it if it is not already 例如,通過(guò)選中“ sql server 2005 express edition ” ,可以指定安裝程序檢查目標(biāo)計(jì)算機(jī)上是否已安裝此組件,若沒(méi)有則進(jìn)行安裝。
This just means that the program checked if a situation was ok , then later used that information , but an attacker can change the situation between those two steps 這只說(shuō)明了程序檢查某種情形是否可行,然后稍后使用那一信息,但是攻擊者可能會(huì)在這兩個(gè)步驟之間改變?cè)撉樾巍?
The best way to avoid freeing memory in a handler is to flag or record the objects to be freed and have the program check from time to time whether anything is waiting to be freed 避免在處理器中釋放內(nèi)存的最好方法是,標(biāo)記或記錄將要釋放的對(duì)象,讓程序不間斷地檢查是否有等待被釋放的內(nèi)存。
By default , prerequisites such as the . net framework are not actually packaged with the setup programduring installation , the setup program checks for the prerequisites and , if necessary , downloads and installs them from the internet Net framework )實(shí)際上沒(méi)有與安裝程序打包在一起安裝過(guò)程中,安裝程序會(huì)檢查系統(tǒng)必備,如果需要,它會(huì)從internet上下載并安裝系統(tǒng)必備。
For example , if a privileged program checks if there s no file of a given name , and then opens for writing that file , an attacker could create a symbolic link file of that name between those two steps to etc passwd or some other sensitive file , for instance 例如,如果某個(gè)已授予特權(quán)的程序檢查是否不存在給定名稱的文件,然后打開(kāi)該文件寫(xiě)入信息,那么在那兩個(gè)步驟之間,攻擊者可以創(chuàng)建一個(gè)使用該名稱的符號(hào)鏈接文件. .