| 1. | View the available commands in privilege mode 查看特权模式下所有可用的命令。 |
| 2. | Type the command used to enter privilege mode 输入命令进行特权模式。 |
| 3. | Many of these transition into privileged mode , perform the operation , and smoothly return to user mode 很多这些例程都转换为特权模式,执行该操作,然后平稳地返回到用户模式。 |
| 4. | Corresponds to the amount of time that the application has spent running code in privileged mode , inside the system core 对应于应用程序在特权模式下、系统内核中运行代码所用的时间。 |
| 5. | Corresponds to the amount of time that the application has spent running in privileged mode , inside the operating system core 对应于应用程序在操作系统内核中以特权模式运行所用的时间。 |
| 6. | Since driver code executes in the most privileged mode possible for the processor , there ' s almost no protection from wild stores 对于处理器,既然驱动代码执行在最特别的模式中,哪里几乎没有来自野外存储的保护。 |
| 7. | Windows uses several different protection mechanisms , and at the root of them all is the distinction between user mode and privileged mode Windows使用了几种不同的保护机制,所有这些机制的根本是用户模式与特权模式之间的区别。 |
| 8. | Windows nt uses several different protection mechanisms , and at the root of them all is the distinction between user mode and privileged mode Windows nt使用多种不同的保护机制,所有这些机制的根本是用户模式和特权模式之间的区别。 |
| 9. | Stack smashing is the worst sort of buffer overflow attack , especially when the stack being smashed is running in privileged mode . an elegant solution to this problem is non - executable stacks 最终的操作取决于检测到的安全性威胁的当前级别,并被转发到代理服务器以传递给发出该请求的客户机。 |