In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
2
Buffer register, circular allotter, control logic, positive run and back run control circuits are replaced by computer software.
由缓冲寄存器、环形分配器、控制逻辑及正反转控制门组成的步进电机控制器则用计算机软件替代。
3
In this system, computer software was used to replace stepping motor controller which consisted of buffer, annular allotter, control logic and control doors of clockwise and counterclockwise running.