Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Memory leak

Index Memory leak

In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations in such a way that memory which is no longer needed is not released. [1]

61 relations: Ada (programming language), Ajax (programming), Auxiliary memory, BoundsChecker, Buffer overflow, C (programming language), C++, Cache (computing), Computer data storage, Computer multitasking, Computer program, Computer science, D (programming language), Dangling pointer, Debugging, Denial-of-service attack, Device driver, Document Object Model, Elevator, Embedded system, Event (computing), Exploit (computer security), Garbage collection (computer science), Handle leak, Hard disk drive, Insure++, Java virtual machine, JavaScript, Kernel (operating system), Lapsed listener problem, Memory debugger, Memory management, Memwatch, Nmon, Null pointer, Object (computer science), Object-oriented programming, Operating system, Paging, Parasoft, Plumbr, Programming language, Programming tool, Pseudocode, PurifyPlus, Reference counting, Resource acquisition is initialization, Resource leak, Router (computing), Segmentation fault, ..., Shared memory, Software aging, Software bug, Thrashing (computer science), Unreachable memory, Valgrind, Visual Basic, Weak reference, Web browser, Web server, Windows Registry. Expand index (11 more) »

Ada (programming language)

Ada is a structured, statically typed, imperative, and object-oriented high-level computer programming language, extended from Pascal and other languages.

New!!: Memory leak and Ada (programming language) · See more »

Ajax (programming)

Ajax (also AJAX; short for "Asynchronous JavaScript And XML") is a set of Web development techniques using many Web technologies on the client side to create asynchronous Web applications.

New!!: Memory leak and Ajax (programming) · See more »

Auxiliary memory

Auxiliary memory, also known as auxiliary storage, secondary storage, secondary memory or external memory, is a non-volatile memory (does not lose stored data when the device is powered down) that is not directly accessible by the CPU, because it is not accessed via the input/output channels (it is an external device).

New!!: Memory leak and Auxiliary memory · See more »

BoundsChecker

BoundsChecker is a memory checking and API call validation tool used for C++ software development with Microsoft Visual C++.

New!!: Memory leak and BoundsChecker · See more »

Buffer overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

New!!: Memory leak and Buffer overflow · See more »

C (programming language)

C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.

New!!: Memory leak and C (programming language) · See more »

C++

C++ ("see plus plus") is a general-purpose programming language.

New!!: Memory leak and C++ · See more »

Cache (computing)

In computing, a cache, is a hardware or software component that stores data so future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation, or the duplicate of data stored elsewhere.

New!!: Memory leak and Cache (computing) · See more »

Computer data storage

Computer data storage, often called storage or memory, is a technology consisting of computer components and recording media that are used to retain digital data.

New!!: Memory leak and Computer data storage · See more »

Computer multitasking

In computing, multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time.

New!!: Memory leak and Computer multitasking · See more »

Computer program

A computer program is a collection of instructions for performing a specific task that is designed to solve a specific class of problems.

New!!: Memory leak and Computer program · See more »

Computer science

Computer science deals with the theoretical foundations of information and computation, together with practical techniques for the implementation and application of these foundations.

New!!: Memory leak and Computer science · See more »

D (programming language)

D is an object-oriented, imperative, multi-paradigm system programming language created by Walter Bright of Digital Mars and released in 2001.

New!!: Memory leak and D (programming language) · See more »

Dangling pointer

Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type.

New!!: Memory leak and Dangling pointer · See more »

Debugging

Debugging is the process of finding and resolving defects or problems within a computer program that prevent correct operation of computer software or a system.

New!!: Memory leak and Debugging · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Memory leak and Denial-of-service attack · See more »

Device driver

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer.

New!!: Memory leak and Device driver · See more »

Document Object Model

The Document Object Model (DOM) is a cross-platform and language-independent application programming interface that treats an HTML, XHTML, or XML document as a tree structure wherein each node is an object representing a part of the document.

New!!: Memory leak and Document Object Model · See more »

Elevator

An elevator (US and Canada) or lift (UK, Australia, Ireland, New Zealand, and South Africa, Nigeria) is a type of vertical transportation that moves people or goods between floors (levels, decks) of a building, vessel, or other structure.

New!!: Memory leak and Elevator · See more »

Embedded system

An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.

New!!: Memory leak and Embedded system · See more »

Event (computing)

In computing, an event is an action or occurrence recognized by software, often originating asynchronously from the external environment, that may be handled by the software.

New!!: Memory leak and Event (computing) · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Memory leak and Exploit (computer security) · See more »

Garbage collection (computer science)

In computer science, garbage collection (GC) is a form of automatic memory management.

New!!: Memory leak and Garbage collection (computer science) · See more »

Handle leak

A handle leak is a type of software bug that occurs when a computer program asks for a handle to a resource but does not free the handle when it is no longer used.

New!!: Memory leak and Handle leak · See more »

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive or fixed disk is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

New!!: Memory leak and Hard disk drive · See more »

Insure++

Insure++ is a memory debugger computer program, used by software developers to detect various errors in programs written in C and C++.

New!!: Memory leak and Insure++ · See more »

Java virtual machine

A Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages and compiled to Java bytecode.

New!!: Memory leak and Java virtual machine · See more »

JavaScript

JavaScript, often abbreviated as JS, is a high-level, interpreted programming language.

New!!: Memory leak and JavaScript · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: Memory leak and Kernel (operating system) · See more »

Lapsed listener problem

The lapsed listener problem is a common source of memory leaks for object-oriented programming languages, among the most common ones for garbage collected languages.

New!!: Memory leak and Lapsed listener problem · See more »

Memory debugger

A memory debugger also known as a runtime debugger is a debugger for finding software memory problems such as memory leaks and buffer overflows.

New!!: Memory leak and Memory debugger · See more »

Memory management

Memory management is a form of resource management applied to computer memory.

New!!: Memory leak and Memory management · See more »

Memwatch

Memwatch is a free programming tool for memory leak detection in C, released under the GNU General Public License.

New!!: Memory leak and Memwatch · See more »

Nmon

nmon (short hand for Nigel's Monitor) is a computer performance system monitor tool for the AIX and Linux operating systems.

New!!: Memory leak and Nmon · See more »

Null pointer

In computing, a null pointer has a value reserved for indicating that the pointer does not refer to a valid object.

New!!: Memory leak and Null pointer · See more »

Object (computer science)

In computer science, an object can be a variable, a data structure, a function, or a method, and as such, is a value in memory referenced by an identifier.

New!!: Memory leak and Object (computer science) · See more »

Object-oriented programming

Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. A feature of objects is that an object's procedures can access and often modify the data fields of the object with which they are associated (objects have a notion of "this" or "self").

New!!: Memory leak and Object-oriented programming · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Memory leak and Operating system · See more »

Paging

In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.

New!!: Memory leak and Paging · See more »

Parasoft

Parasoft (officially Parasoft Corporation) is an independent software vendor specializing in automated software testing and application security with headquarters in Monrovia, California.

New!!: Memory leak and Parasoft · See more »

Plumbr

Plumbr is an Estonian software product company founded in late 2011 that develops performance monitoring software running on a Java Virtual Machine (JVM).

New!!: Memory leak and Plumbr · See more »

Programming language

A programming language is a formal language that specifies a set of instructions that can be used to produce various kinds of output.

New!!: Memory leak and Programming language · See more »

Programming tool

A programming tool or software development tool is a computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications.

New!!: Memory leak and Programming tool · See more »

Pseudocode

Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm.

New!!: Memory leak and Pseudocode · See more »

PurifyPlus

PurifyPlus is a memory debugger program used by software developers to detect memory access errors in programs, especially those written in C or C++.

New!!: Memory leak and PurifyPlus · See more »

Reference counting

In computer science, reference counting is a technique of storing the number of references, pointers, or handles to a resource such as an object, block of memory, disk space or other resource.

New!!: Memory leak and Reference counting · See more »

Resource acquisition is initialization

Resource acquisition is initialization (RAII)Bjarne Stroustrup Accessed on 2013-01-02.

New!!: Memory leak and Resource acquisition is initialization · See more »

Resource leak

In computer science, a resource leak is a particular type of resource consumption by a computer program where the program does not release resources it has acquired.

New!!: Memory leak and Resource leak · See more »

Router (computing)

A router is a networking device that forwards data packets between computer networks.

New!!: Memory leak and Router (computing) · See more »

Segmentation fault

In computing, a segmentation fault (often shortened to segfault) or access violation is a fault, or failure condition, raised by hardware with memory protection, notifying an operating system (OS) the software has attempted to access a restricted area of memory (a memory access violation).

New!!: Memory leak and Segmentation fault · See more »

Shared memory

In computer science, shared memory is memory that may be simultaneously accessed by multiple programs with an intent to provide communication among them or avoid redundant copies.

New!!: Memory leak and Shared memory · See more »

Software aging

In software engineering, software aging refers to all software's tendency to fail, or cause a system failure after running continuously for a certain time.

New!!: Memory leak and Software aging · See more »

Software bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

New!!: Memory leak and Software bug · See more »

Thrashing (computer science)

In computer science, thrashing occurs when a computer's virtual memory resources become saturated, leading to a constant state of paging (rapidly exchanging data in memory for data on disk), to the exclusion of most application-level processing.

New!!: Memory leak and Thrashing (computer science) · See more »

Unreachable memory

In computer science, unreachable memory is a block of memory allocated dynamically where the program that allocated the memory no longer has any reachable pointer that refers to it.

New!!: Memory leak and Unreachable memory · See more »

Valgrind

Valgrind is a programming tool for memory debugging, memory leak detection, and profiling.

New!!: Memory leak and Valgrind · See more »

Visual Basic

Visual Basic is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its Component Object Model (COM) programming model first released in 1991 and declared legacy during 2008.

New!!: Memory leak and Visual Basic · See more »

Weak reference

In computer programming, a weak reference is a reference that does not protect the referenced object from collection by a garbage collector, unlike a strong reference.

New!!: Memory leak and Weak reference · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: Memory leak and Web browser · See more »

Web server

Web server refers to server software, or hardware dedicated to running said software, that can serve contents to the World Wide Web.

New!!: Memory leak and Web server · See more »

Windows Registry

The registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.

New!!: Memory leak and Windows Registry · See more »

Redirects here:

Leakage (computer science), Memleak, Memory Leak, Memory leaks, Space leak, Storage leak.

References

[1] https://en.wikipedia.org/wiki/Memory_leak

OutgoingIncoming
Hey! We are on Facebook now! »