1. D
ATa th
AT is written to be interpreted and takes over program flow when triggered by some un-obvious oper
ATion, such as viewing it. One use of such hacks is to break security. For example, some smart terminals have commands th
AT allow one to download strings to program keys this can be used to write live d
ATa th
AT, when listed to the terminal, infects it with a security-breaking
virus th
AT is triggered the next time a hapless user strikes th
AT key. For another, there are some well-known bugs in
vi th
AT allow certain texts to send arbitrary commands back to the machine when they are simply viewed. 2. In
C, d
ATa th
AT includes pointers to functions (executable code). 3. An object, such as a
trampoline, th
AT is constructed on the fly by a program and intended to be executed as code. 4. Actual real-world d
ATa, as opposed to "test d
ATa". For example, "I think I have the record deletion module finished." "Have you tried it out on live d
ATa?" This usage usually carries the connot
ATion th
AT live d
ATa is more fragile and must not be corrupted, or bad things will happen. So a more appropri
ATe response to the above claim might be: "Well, make sure it works perfectly before we throw live d
ATa
AT it." The implic
ATion here is th
AT record deletion is something pretty significant, and a haywire record-deletion module running amok on live d
ATa would probably cause gre
AT harm. [
Jargon File]
In addition suitable contents:
[ 2 ] [ = ] [ ad ] [ ag ] [ ai ] [ al ] [ am ] [ an ] [ app ] [ ar ] [ arc ] [ arg ] [ as ] [ AT ] [ au ] [ av ] [ b ] [ ba ] [ be ] [ bi ] [ bit ] [ bj ] [ bo ] [ br ] [ break ] [ bv ] [ by ] [ C ] [ ca ] [ cAT ] [ ch ] [ ck ] [ cl ] [ co ] [ code ] [ com ] [ comma ] [ command ] [ con ] [ cons ] [ cu ] [ D ] [ dATa ] [ de ] [ do ] [ down ] [ download ] [ du ] [ ec ] [ ed ] [ er ] [ era ] [ es ] [ et ] [ exec ] [ executable ] [ execute ] [ fi ] [ file ] [ fo ] [ for ] [ fr ] [ fragile ] [ function ] [ ge ] [ gh ] [ gi ] [ gn ] [ gr ] [ gs ] [ h ] [ hack ] [ hAT ] [ hing ] [ hr ] [ ht ] [ id ] [ ie ] [ il ] [ in ] [ inc ] [ include ] [ int ] [ interpreted ] [ io ] [ ir ] [ is ] [ it ] [ J ] [ Jargon File ] [ ke ] [ key ] [ ki ] [ kn ] [ la ] [ ld ] [ Lex ] [ li ] [ line ] [ list ] [ load ] [ ls ] [ lu ] [ ly ] [ ma ] [ machine ] [ man ] [ mm ] [ mo ] [ mod ] [ module ] [ mp ] [ mu ] [ na ] [ nc ] [ ne ] [ nf ] [ ng ] [ ni ] [ nl ] [ nn ] [ no ] [ ns ] [ O ] [ object ] [ om ] [ op ] [ pe ] [ perf ] [ ph ] [ pl ] [ ply ] [ point ] [ pointer ] [ pr ] [ program ] [ pt ] [ query ] [ rc ] [ re ] [ real ] [ record ] [ rete ] [ rl ] [ ro ] [ row ] [ ru ] [ run ] [ S ] [ sa ] [ se ] [ sh ] [ si ] [ sig ] [ sm ] [ smart ] [ smart terminal ] [ so ] [ st ] [ string ] [ struct ] [ su ] [ T ] [ table ] [ terminal ] [ test ] [ text ] [ th ] [ to ] [ tr ] [ trampoline ] [ trigger ] [ tt ] [ tty ] [ ua ] [ ug ] [ up ] [ us ] [ user ] [ ve ] [ vi ] [ virus ] [ win ] [ write ]