- injected file
- Вычислительная техника: поражённый файл, файл, заражённый вирусом
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Gemstone File — The Gemstone File is a series of documents by the American writer Bruce Porter Roberts (1919 1976). The best known document is probably the 23 page A Skeleton Key to the Gemstone File , written by Stephanie Caruana in 1975, which presents a brief … Wikipedia
Durrum D-500 — File:D 500.jpg Durrum D 500 Amino acid Analyzer The D 500 Amino Acid Analyzer was designed and built by Durrum Instruments in the late 1960s. It was used by many prestigious Universities and research facilities to test for presence and quantity… … Wikipedia
Rhinoplasty — For the album by Primus, see Rhinoplasty (album). Rhinoplasty Intervention Rhinoplasty: The lower lateral cartilage (greater alar cartilage) exposed for plastic modification via the left nostril … Wikipedia
Large Hadron Collider — LHC redirects here. For other uses, see LHC (disambiguation). Coordinates: 46°14′N 06°03′E / 46.233°N 6.05°E / 46.233; 6.05 … Wikipedia
Oil shale extraction — is an industrial process in which kerogen mdash;a mixture of organic chemical compounds (including hydrocarbons) found in oil shale mdash;is converted into synthetic crude oil through pyrolysis. In pyrolysis, oil shale is heated in the absence of … Wikipedia
Dependency injection — (DI) is a design pattern in object oriented computer programming whose purpose is to improve testability of, and simplify deployment of components in very large software systems. The Dependency Injection pattern involves at least three elements:… … Wikipedia
Cessna 172 — Skyhawk Cessna 172M Role Civil utility aircraft … Wikipedia
List of doping cases in cycling — The following is an incomplete list of doping cases in cycling, where doping means use of physiological substances or abnormal method to obtain an artificial increase of performance . It is neither a list of shame nor a list of illegality, as the … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Comparison of C Sharp and Java — The correct title of this article is Comparison of C# and Java. The substitution or omission of the # sign is because of technical restrictions. Programming language comparisons General comparison Basic syntax Basic instructions … Wikipedia
Shellcode — In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called shellcode because it typically starts a command shell from which the attacker can control the compromised … Wikipedia