Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
2
The initial segment of the first program is loaded from the modified input tape and given control. Operation at this time becomes single phase.
第一个程序的初始段的装载是从修改输入磁带和给定控制开始的。此时的操作变为单相的。
3
Input file tape identification or call CARDS follow the accounting card except when the control card and possibly the binary program are required.