killer poke - définition. Qu'est-ce que killer poke
Diclib.com
Dictionnaire ChatGPT
Entrez un mot ou une phrase dans n'importe quelle langue 👆
Langue:

Traduction et analyse de mots par intelligence artificielle ChatGPT

Sur cette page, vous pouvez obtenir une analyse détaillée d'un mot ou d'une phrase, réalisée à l'aide de la meilleure technologie d'intelligence artificielle à ce jour:

  • comment le mot est utilisé
  • fréquence d'utilisation
  • il est utilisé plus souvent dans le discours oral ou écrit
  • options de traduction de mots
  • exemples d'utilisation (plusieurs phrases avec traduction)
  • étymologie

Qu'est-ce (qui) est killer poke - définition

SOFTWARE MEANS OF CAUSING COMPUTER HARDWARE DAMAGE

killer poke         
A recipe for inducing hardware damage on a machine via insertion of invalid values (see poke) into a memory-mapped control register; used especially of various fairly well-known tricks on bitty boxes without hardware memory management (such as the IBM PC and Commodore PET) that can overload analog electronics in the monitor. See also HCF. (1994-11-04)
Killer poke         
In computer jargon, a killer poke is a method of inducing physical hardware damage on a machine or its peripherals by the insertion of invalid values, via, for example, BASIC's POKE command, into a memory-mapped control register. The term is typically used to describe a family of fairly well known tricks that can overload the analog electronics in the CRT monitors of computers lacking hardware sanity checking (notable examples being the IBM Portable and Commodore PET.
Killer         
WIKIMEDIA DISAMBIGUATION PAGE
Killer (band); Killer (song); KILLER; Killer (film); Killer (disambiguation); Killer (album)
·noun One who deprives of life; one who, or that which, kills.
II. Killer ·noun A voracious, toothed whale of the genus Orca, of which several species are known.

Wikipédia

Killer poke

In computer jargon, a killer poke is a method of inducing physical hardware damage on a machine or its peripherals by the insertion of invalid values, via, for example, BASIC's POKE command, into a memory-mapped control register. The term is typically used to describe a family of fairly well known tricks that can overload the analog electronics in the CRT monitors of computers lacking hardware sanity checking (notable examples being the IBM Portable and Commodore PET.)