- heap corruption
- разрушение хипапрограммная ошибка, следствие неправильной работы с хипом
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.
Heap overflow — A heap overflow is a type of buffer overflow that occurs in the heap data area. Memory on the heap is dynamically allocated by the application at run time and typically contains program data.Exploitation goes as follows: if an application copies… … Wikipedia
Memory corruption — happens when the contents of a memory location are unintentionally modified due to programming errors; this is known as violating memory safety. When the corrupted memory contents are used later in the computer program, it leads either to program … Wikipedia
Soft heap — In computer science, the soft heap, designed by Bernard Chazelle in 2000, is a variant on the simple heap data structure. By carefully corrupting (increasing) the keys of at most a certain fixed percentage of values in the heap, it is able to… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Helix (project) — This article is about the free and open source software media project. See helix (disambiguation) for other meanings. Helix is a project to produce software that can play audio and video media in various formats, aid in producing such media, and… … Wikipedia
Bomb (symbol) — The Bomb icon is a symbol designed by Susan Kare that was displayed inside the System Error alert box when the classic Macintosh operating system (pre Mac OS X) had a crash in which the system decided it was unrecoverable. It was similar to a… … Wikipedia
Manual memory management — In computer science, manual memory management refers to the usage of manual instructions by the programmer to identify and deallocate unused objects, or garbage. Up until the mid 1990s, the majority of programming languages used in industry… … Wikipedia
Duma (software) — Detect Unintended Memory Access (or DUMA) is a memory debugger. It consists of a library which programmers can link into their code to override the C standard library and C++ memory management functions. DUMA triggers a program crash when the… … Wikipedia
Electric Fence — For the physical barrier, see electric fence. Electric Fence (or eFence) is a memory debugger written by Bruce Perens. It consists of a library which programmers can link into their code to override the C standard library memory management… … Wikipedia
Destructor (computer science) — In object oriented programming, a destructor (sometimes shortened to dtor) is a method which is automatically invoked when the object is destroyed. Its main purpose is to clean up and to free the resources which were acquired by the object along… … Wikipedia
PaX — In computer security, PaX is a patch for the Linux kernel that implements least privilege protections for memory pages. The least privilege approach allows computer programs to do only what they have to do in order to be able to execute properly … Wikipedia