hook function造句
例句与造句
- Demonstrates the c run - time debugging hook functions
说明c运行时调试挂钩函数。 - Would cause the hook function to be called , the hook would in turn call
将导致调用挂钩函数,挂钩函数则调用 - Debug hook function writing
编写调试挂钩函数 - Calls hook function
调用挂钩函数_ penter - The hook function uses
挂钩函数使用 - It's difficult to find hook function in a sentence. 用hook function造句挺难的
- A client - dump hook function validates the birthday data and reports the contents of the client blocks
客户端转储挂钩函数验证这些生日数据并报告client块的内容。 - This paper introduces hooks functions , types , procedure formats , and the installationmethod as well as a simple practical example
介绍了钩子的功能、类型、钩子过程的格式和安装方法及一个简单应用实例 - The crt dbg2 sample illustrates several ways to use debugging hook functions with the debug versions of the c run - time library
Crt _ dbg2示例演示了几种将调试挂钩函数用于多种c运行时库的调试版本的方法。 - Note that the allocation hook function explicitly excludes crt blocks the memory allocated internally by the c run - time library from its log
请注意,分配挂钩函数将crt块(由c运行时库内部分配的内存)从其日志中显式地排除。 - An allocation hook function logs heap operations to a text file , and the report hook function logs selected reports to the same text file
分配挂钩函数将堆操作记录到文本文件中,报告挂钩函数将选定的报告记录到同一文本文件中。 - Lists links to client block hook functions , allocation hook functions , allocation hooks and crt memory allocations , and report hook functions
列出指向客户端块挂钩函数、分配挂钩函数、分配挂钩和crt内存分配以及报告挂钩函数的链接。 - Links you to debugging techniques for the c run - time library , including using the crt debug library , macros for reporting , differences between malloc and malloc dbg , writing debug hook functions , and the crt debug heap
链接到用于c运行时库的调试技术,包括:使用crt调试库、用于报告的宏、 malloc和_ malloc _ dbg之间的差异、编写调试挂钩函数以及crt调试堆。 - Common network attacks such as ip spoofing , source route spoofing , icmp redirect deception and ip hijack are analyzed and protected by filter manage module . . ip hijack protection is implemented through injecting a hook function into protocol stack in detail
针对常见的ip地址欺骗、 ip源路由欺骗、 icmp重定向欺骗、 ip劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法,其中ip劫持防御是用一个钩子函数注入协议栈中来实现的。 - Secondly , we implement a bpf model called mybpf on linux as a kernel module . it can collect packets within the netfilter frame , provide the applications with an interface in char device file manner and be attached to the nf _ ip _ pre _ routing hook defined by netfilter frame for ipv4 as a hook function . finally , we evaluate the performance between mybpf and other bpf on sock _ packet socket
该模块以字符设备文件的形式为应用程序提供接口,并在netfilter框架为ipv4定义的nf _ ip _ pre _ routing钩子上挂接了一个钩子函数,该钩子函数实现bpf虚拟机,完成对数据包的捕获;最后,本文对mybpf模块作了相应的测试并与在sock _ packet套接口上实现的bpf做了性能比较。