Attackers can sometimes use this and similar tricks to ensure that what the applicationprogram sees and what the called routine sees are different.
攻击者有时可以利用这一点或类似的技巧来确保应用程序看到的内容和所调用的例程看到的内容不同。
2
In this paper an example is given for the application of the routine overlay method to the retrofit program of the. orbit of an artificial earth satellite.
本文介绍程序覆盖法在人造卫星轨道改进程序中应用的一个例子。
3
In the conventional application of TMS320VC5416, the user's program hasn't often beyond routine program code.