target computer


Also found in: Dictionary.

target computer

The computer into which a program is loaded and run. Contrast with source computer. See cross assembler and cross compiler.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Simulink RealTime and Speedgoat target computer hardware are expressly designed to work together to create real-time systems for desktop, lab, and field environments.
This is often the only way an attacker can reach a target computer that is not connected to the Internet.
A user of the target computer unwittingly visited an infected website or clicked on an infected banner advertisement.
The 22 papers in this collection look at ways to detect, counter, and protect against intelligence threats that target computer networks, financial systems, and defense and economic entities.
The idea is the application can take place on several host computers and one target computer that it is connected to the control system.
However, they can allow a hacker remote access to a target computer system, so that he can execute various operations, such as data theft, downloading or uploading files or adding the computer to the malicious botnet.
The complier was the intermediate program that translates English language instructions into the language of the target computer.
The only concerns expressed by users were in regard to a "footprint" that Field Search leaves on the target computer. Because Field Search runs live on the target computer, it does not leave the computer exactly as it found it.
The '135 patent covers a method of transparently creating a virtual private network (VPN) between a client computer and a target computer. The '180 patent covers a method for establishing a VPN using a secure domain name service.
It s designed to give the sender complete control of the target computer which then could be used to deploy other botnet malware, adware or spyware onto the victims computer.
<p>The attack proved successful when tapping electric sockets located up to 15 meters from where the target computer was plugged in the researchers say.