cross assembler

(redirected from target computer)
Also found in: Encyclopedia.

cross assembler

n
(Computer Science) an assembler that runs on a computer other than the one for which it assembles programs
Mentioned in ?
References in periodicals archive ?
The tool allows for the identification, control and manipulation of the monitoring and detection systems, like webcams and microphones, on a target computer running the Microsoft Windows operating system.
In an enterprise scenario, a remote unauthenticated attacker could remotely trigger the vulnerability through an SMB [sever message block] connection and then take control of a target computer," a security bulletin published by Microsoft said.
Tenders are invited for Target Computer With Input/Output Modules For Cisl
Unlike some applications that work with the secure FTP protocol, FreeFileSync eliminates the tedious and error-prone tasks of manually identifying files that have changed on the source computer and moving them to the target computer.
Zero-Day and Other Exploits: A zero-day exploit is a vulnerability in a software product that allows an attacker to execute unintended code or gain control of a target computer.
A user of the target computer unwittingly visited an infected website or clicked on an infected banner advertisement.
CopyRight2 will automatically create the links with a modified target computer name appending a user chosen suffix, e.
The 22 papers in this collection look at ways to detect, counter, and protect against intelligence threats that target computer networks, financial systems, and defense and economic entities.
The idea is the application can take place on several host computers and one target computer that it is connected to the control system.
The only concerns expressed by users were in regard to a "footprint" that Field Search leaves on the target computer.
The '135 patent covers a method of transparently creating a virtual private network (VPN) between a client computer and a target computer.
It s designed to give the sender complete control of the target computer which then could be used to deploy other botnet malware, adware or spyware onto the victims computer.