It enters coding information that enables a hacker to gain use of the program's memory and other controls.
它会输入编码信息允许黑客获得程序的内存和其它控件的使用权限。
计算机科学 Crash Course
With the ability to arbitrarily manipulate a program's memory, hackers can bypass things like login prompts, and sometimes even use that program to hijack the whole system.
有了任意修改内存的能力,黑客可以绕过 "登录" 之类的东西,甚至使用那个程序劫持整个系统。
科技 Crash Course
But attackers can also exploit this bug more cleverly by injecting purposeful new values into a program's memory, for example, setting an " is admin" variable to true.
Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware and unlikely to need frequent updates) or application software in plug-in cartridges.