简体版 繁體版 English
로그인 회원가입

remote programs 예문

예문모바일

  • I have tried a few remote programs but the lag makes it impossible to play the game.
  • In some cases buffer overflow bugs can be exploited to crash remote programs while simultaneously executing illicit code.
  • Internet protocol implementations allow for the possibility of encapsulating exploit code to compromise a remote program which uses a different protocol.
  • He also led the Nexus OS effort, where he developed new techniques for attesting to, and reasoning about, the semantic properties of remote programs.
  • What we need to be able to do is find a way to make image overlays, and adjust the following properties from a remote program:
  • New classes of VCP codes associated with asset management, secondary displays ( for information, status, etc . ) and remote program calls to the display processor are introduced.
  • Some operating systems had only a single style of command interface; commodity operating systems such as MS-DOS came with a standard command interface but third-party interfaces were also often available, providing additional features or functions such as menuing or remote program execution.
  • The command exports part of its local namespace, including the user's terminal's devices (,, ), to the server, so that remote programs can perform input / output using the terminal's mouse, keyboard and display, combining the effects of remote login and a shared network filesystem.
  • WPS1 also broadcast historic recordings from university and private collections and from the audio archives of the Museum of Modern Art; presented live remote programs from festivals including the Armory Show, Art Basel Miami Beach, and the Venice Biennale; and frequently features panel discussions hosted by different New York cultural institutions.
  • This of course is not possible for distributed systems since an ( absolute ) address  in the caller's address space  is normally meaningless to the remote program ( however, a relative address might in fact be usable if the receiver had an " exact " copy of, at least some of, the sender's memory in advance ).