(redirected from Executable code)
Also found in: Dictionary, Thesaurus, Medical, Financial, Encyclopedia.


To complete; to make; to sign; to perform; to do; to carry out according to its terms; to fulfill the command or purpose of. To perform all necessary formalities, as to make and sign a contract, or sign and deliver a note.

Execute is the opposite of executory, incomplete or yet to be performed.

West's Encyclopedia of American Law, edition 2. Copyright 2008 The Gale Group, Inc. All rights reserved.


v. 1) to finish, complete, or perform as required, as in fulfilling one's obligations under a contract or a court order. 2) to sign and otherwise complete a document, such as acknowledging the signature if required to make the document valid. 3) to seize property under court order. 4) to put to death pursuant to a sentence rendered by a court. (See: contract, capital punishment, executed, execution)

Copyright © 1981-2005 by Gerald N. Hill and Kathleen T. Hill. All Right reserved.

TO EXECUTE. To make, to perform, to do, to follow out. This term is frequently used in the law; as, to execute a deed is to make a deed.
     2. It also signifies to perform, as to execute a contract; hence some contracts are called executed contracts, and others are called executory contracts.
     3. To execute also means to put to death by virtue of a lawful sentence; as, the sheriff executed the convict.

A Law Dictionary, Adapted to the Constitution and Laws of the United States. By John Bouvier. Published 1856.
References in periodicals archive ?
The device is thought to be protected by the use of W [R] X policy and the attacker can't insert arbitrary executable code in the stack or the heap.
Section Header Table $ readelf -S test There are 28 section headers, starting at offset 0x80c: Section Headers: [Nr] Name Type Addr Off Size ES Flg Lk Inf Al [11] .plt PROGBITS 08048290 000290 000030 04 AX 0 0 4 [12] .text PROGBITS 080482c0 0002c0 0001d0 00 AX 0 0 4 [20] .got PROGBITS 080495d8 0005d8 000004 04 WA 0 0 4 [21] .got.plt PROGBITS 080495dc 0005dc 000014 04 WA 0 0 4 [22] .data PROGBITS 080495f0 0005f0 000010 00 WA 0 0 4 [23] .bss NOBITS 08049600 000600 000008 00 WA 0 0 4 The .text section is where the executable code of the binary resides.
The same strategy lies at the heart of San Ramon, CA-based Faronics' literally named filtering tool, Anti-Executable, designed specifically to shield school computers from malicious executable code. The product works from a white list, a roster of authorized programs that district tech managers and IT administrators control.
As part of this major SandBox release, SandBox Analyzer products now have the ability to not only detect and analyze executable code, but also exploit code concealed in Microsoft Office as well as other popular exploitable file formats.
You can get malware from graphics files, music files, document files and pretty much anything else capable of carrying a form of executable code. If you want a truly frightening picture of the ratio of bad to good applications, take a look at the list your antivirus software uses to identify malicious code.
Unlike traditional approaches, ESET solutions decode and analyse executable code in real-time, using an emulated environment.
Once installed on a computer, it reads every bit of executable code on that unit to determine a profile for that computer.
Examples of specific topics include a stochastic model for video and its information rates, spatial sparsity induced temporal prediction for hybrid video compression, differential compression of executable code, parallel decoding for lossless image compression by block matching, high throughput compression of double- precision floating-point data, and Bayesian detection in bounded height tree networks.
The device is available as either a callable function which is integrated into an OEM's framework, or as a standalone DSP image of executable code.
MySpace, and Skype, has depended on the creators' ability to send executable code as well as data to the user's personal computer.
The reality, the association pointed out, is that tag contents are never interpreted as executable code but are interpreted only as simple raw data.
"Companies are best protected by automating their anti-virus protection and putting a policy in place at their email gateway to block unsolicited executable code from the outside world."