Note that such stale pointer accesses do not always result in access violations.
请注意,这种陈旧的指针访问并不总是在访问冲突的结果。
Audit logs for events such as access violations can also be managed by the security server.
事件(比如违规访问)审计日志还可以由安全服务器管理。
Audit logs, for things such as access violations, are sent to the security server by default.
默认情况下,审计日志(比如违规访问)被发送到安全服务器。
Metrics, reports, and queries can be used to assess the state of the models, as well as to track access violations.
可以使用工具、报告和查询来评价模型的状态,并追踪访问入侵情况。
In programs consisting entirely of verifiable managed code, all references are either valid or null, and access violations are impossible.
在完全由可验证托管代码组成的程序中,所有引用都有效或者为空,因而不会产生访问冲突。
Because the compiler allocates constant strings in a static read-only memory, any attempts to modify it cause access violations and random crashes.
因为编译器在静态只读内存中分配常数字符串,所以,尝试修改该内存会导致访问冲突和随机崩溃。
On C or C++ projects, we always made it mandatory to run Purify on components to prevent memory access violations from making their way into production code.
在C或者 C++项目中,我们已经强制在组件上运行Purify来预防进入产品代码的内存访问的违规。
In some unusual cases, it is also possible for access violations or similar problems to be triggered in DLLs which are called before they have been initialized.
在某些特殊情况下,可能还会在未初始化就被调用的DLL中触发访问冲突或类似问题。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
Little information was available on formal criminal justice procedures and practices, and outside access to the legal system was limited to trials for traffic violations and other minor offenses.
——译者进行惩治。正式的刑事司法程序和实践中可以获知的信息非常少,而外界对法律系统的了解也仅限于对违反交通规则和其他轻罪的审判。
There may be violations logging processes for investigation of any unauthorized attempt to access information.
本公司可能设有记录违反事项的程序,以便调查未经授权试图取用资料的行为。
There may be violations logging processes for investigation of any unauthorized attempt to access information.
本公司可能设有记录违反事项的程序,以便调查未经授权试图取用资料的行为。
应用推荐