From professional translators, enterprises, web pages and freely available translation repositories.
예 1. checking constants
例 1定数のチェック
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
예 5-3. more secure file name checking
例 5-3より安全なファイル名の確認
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
예 5-1. poor variable checking leads to....
例 5-1甘い変数の確認から生じるリスク
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
예 1. checking a color name against a shell wildcard pattern.
例 1 checking a color name against a shell wildcard pattern.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
mode is the mode used to open the file, as detailed for fopen(). you are responsible for checking that mode is valid for the path requested.
mode is the mode used to open the file, as detailed for fopen(). you are responsible for checking that mode is valid for the path requested.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
assertions should not be used for normal runtime operations like input parameter checks. as a rule of thumb your code should always be able to work correct if assertion checking is not activated.
コールバック関数は、3つの引数を受ける必要があります。最初の引数 は、assertionが失敗したファイルが含まれます。2番目の引数には、 assertionが失敗した行が含まれ、3番目の引数には失敗した式が含ま れます。(もしある場合のみ。1または"two"のようなリテラルの値はこ の引数に渡されません)
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
if the assertion is given as a string it will be evaluated as php code by assert(). the advantages of a string assertion are less overhead when assertion checking is off and messages containing the assertion expression when an assertion failes.
assersion は、入力パラメータのチェックのような通常の実行動作に使 用するべきではありません。一般的には、assertion のチェックが有効 でない場合に自分のコードを常に正常に動作することができる必要があり ます。
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
after the declaration, code for checking and retrieving the function's arguments, argument conversion, and return value generation follows (more on this later).
after the declaration, code for checking and retrieving the function's arguments, argument conversion, and return value generation follows (more on this later).
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
a standard attack tactic involves profiling a system by feeding it improper data, and checking for the kinds, and contexts, of the errors which are returned. this allows the system cracker to probe for information about the server, to determine possible weaknesses.
phpのセキュリティに関して、2種類のエラー出力があります。一つは、セ キュリティ向上に役立つものであり、もう一つは、セキュリティ上有害な ものです。
Last Update: 2011-10-24
Usage Frequency: 1
Quality: