1. Data that is written to be interpreted and takes over program flow when triggered b
Y some un-obvious operation, such as viewing it. One use of such hacks is to break securit
Y. For example, some smart terminals have commands that allow one to download strings to program ke
Ys this can be used to write live data that, when listed to the terminal, infects it with a securit
Y-breaking
virus that is triggered the next time a hapless user strikes that ke
Y. For another, there are some well-known bugs in
vi that allow certain texts to send arbitrar
Y commands back to the machine when the
Y are simpl
Y viewed. 2. In
C, data that includes pointers to functions (executable code). 3. An object, such as a
trampoline, that is constructed on the fl
Y b
Y a program and intended to be executed as code. 4. Actual real-world data, as opposed to "test data". For example, "I think I have the record deletion module finished." "Have
You tried it out on live data?" This usage usuall
Y carries the connotation that live data is more fragile and must not be corrupted, or bad things will happen. So a more appropriate response to the above claim might be: "Well, make sure it works perfectl
Y before we throw live data at it." The implication here is that record deletion is something prett
Y significant, and a ha
Ywire record-deletion module running amok on live data would probabl
Y cause great harm. [
Jargon File]
Yle="border-width:thin; border-color:#333333; border-stYle:dashed; padding:5px;" align="left">In addition suitable contents:
[ 2 ] [ = ] [ ad ] [ ag ] [ ai ] [ al ] [ am ] [ an ] [ app ] [ ar ] [ arc ] [ arg ] [ as ] [ at ] [ au ] [ av ] [ b ] [ ba ] [ be ] [ bi ] [ bit ] [ bj ] [ bo ] [ br ] [ break ] [ bv ] [ bY ] [ C ] [ ca ] [ cat ] [ ch ] [ ck ] [ cl ] [ co ] [ code ] [ com ] [ comma ] [ command ] [ con ] [ cons ] [ cu ] [ D ] [ data ] [ de ] [ do ] [ down ] [ download ] [ du ] [ ec ] [ ed ] [ er ] [ era ] [ es ] [ et ] [ exec ] [ executable ] [ execute ] [ fi ] [ file ] [ fo ] [ for ] [ fr ] [ fragile ] [ function ] [ ge ] [ gh ] [ gi ] [ gn ] [ gr ] [ gs ] [ h ] [ hack ] [ hat ] [ hing ] [ hr ] [ ht ] [ id ] [ ie ] [ il ] [ in ] [ inc ] [ include ] [ int ] [ interpreted ] [ io ] [ ir ] [ is ] [ it ] [ J ] [ Jargon File ] [ ke ] [ keY ] [ ki ] [ kn ] [ la ] [ ld ] [ Lex ] [ li ] [ line ] [ list ] [ load ] [ ls ] [ lu ] [ lY ] [ ma ] [ machine ] [ man ] [ mm ] [ mo ] [ mod ] [ module ] [ mp ] [ mu ] [ na ] [ nc ] [ ne ] [ nf ] [ ng ] [ ni ] [ nl ] [ nn ] [ no ] [ ns ] [ O ] [ object ] [ om ] [ op ] [ pe ] [ perf ] [ ph ] [ pl ] [ plY ] [ point ] [ pointer ] [ pr ] [ program ] [ pt ] [ querY ] [ rc ] [ re ] [ real ] [ record ] [ rete ] [ rl ] [ ro ] [ row ] [ ru ] [ run ] [ S ] [ sa ] [ se ] [ sh ] [ si ] [ sig ] [ sm ] [ smart ] [ smart terminal ] [ so ] [ st ] [ string ] [ struct ] [ su ] [ T ] [ table ] [ terminal ] [ test ] [ text ] [ th ] [ to ] [ tr ] [ trampoline ] [ trigger ] [ tt ] [ ttY ] [ ua ] [ ug ] [ up ] [ us ] [ user ] [ ve ] [ vi ] [ virus ] [ win ] [ write ]