JargonFile/original/html/L/live-data.html
2014-03-27 18:54:56 +00:00

15 lines
2.6 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>live data</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../L.html" title="L"/><link rel="previous" href="live.html" title="live"/><link rel="next" href="Live-Free-Or-Die-.html" title="Live Free Or Die!"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">live data</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="live.html">Prev</a> </td><th width="60%" align="center">L</th><td width="20%" align="right"> <a accesskey="n" href="Live-Free-Or-Die-.html">Next</a></td></tr></table><hr/></div><dt><a id="live-data"/><dt xmlns="" id="live-data"><b>live data</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> 1. Data that is written to be interpreted and takes over program
flow when triggered by some un-obvious operation, such as viewing it. One
use of such hacks is to break security. For example, some smart terminals
have commands that allow one to download strings to program keys; this can
be used to write live data that, when listed to the terminal, infects it
with a security-breaking <a href="../V/virus.html"><i class="glossterm">virus</i></a> that is triggered the
next time a hapless user strikes that key. For another, there are some
well-known bugs in <a href="../V/vi.html"><i class="glossterm">vi</i></a> that allow certain texts to
send arbitrary commands back to the machine when they are simply
viewed.</p></dd><dd><p> 2. In C code, data that includes pointers to function
<a href="../H/hook.html"><i class="glossterm">hook</i></a>s (executable code). </p></dd><dd><p> 3. An object, such as a <a href="../T/trampoline.html"><i class="glossterm">trampoline</i></a>, that is
constructed on the fly by a program and intended to be executed as
code.</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="live.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../L.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="Live-Free-Or-Die-.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">live </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> Live Free Or Die!</td></tr></table></div></body></html>