Примеры использования Overwriting на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
This prevents overwriting of the file being recorded at the time.
This eliminates the need to go through the expensive overwriting process and maintains the integrity of the drive for warranty or lease returns.
Files protected from overwriting by G-sensor are recorded in a loop with a 15 files limit.
Please read this article to find out how it might happen: Overwriting memory- why?
Files protected from overwriting by the G-sensor are recorded in a loop taking up 30% of the total storage space.
Where possible, we work on the original document by overwriting the text without changing the style or format.
I recommend the article" Overwriting memory- why?
Attempts to counter data remanence by overwriting may not be successful in such situations,
continue and avoid overwriting, you will need to rename it each time you add another file.
GET parameters are not properly handled, allowing to inject options into munin-cgi-graph and overwriting any file accessible by the user running the cgi-process.
you need to reflect the same meaning, but without overwriting the names!).
When the conversion is performed by overwriting existing versions of files,
Overwriting system files can cause the operating system to behave unexpectedly
Video clips recorded when the G-sensor is tripped are automatically protected from deletion caused by loop overwriting.
Overwriting Existing Versions of Files When you overwrite the existing versions of files, the existing files are replaced with upgraded files.
No notification of completion is generated by the drive, and overwriting won't cover reallocated sectors,
which allows local users to perform a denial of service attack by overwriting arbitrary files.
Overwriting Files with Revision Tags You can include files with revision tags as files that are upgraded.
An attacker sending carefully crafted SSDP queries to a daemon built on libupnp4 could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution.
which may result in local denial of service by overwriting files.