黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
大多数人想到朋友、邻居或是同事,仅少数人(25%的加拿大男人)会联想到虚拟人物。
The majority of folks think about friends, neighbors, or co-workers, while a slightly smaller percentage (25% of Canadian men) prefer fantasizing about imaginary characters.
他可以进入邻居的虚拟机并在PaaS应用程序中添加恶意代码。
He can get inside a neighbor's virtual machine and add malicious code to PaaS applications.
介绍了目前几种常用的虚拟骨干网设计方案,并从算法的复杂度和所需的邻居信息等方面对其进行比较。
A few of main design schemes of virtual backbone are presented, and are compared and analyzed from arithmetic complexity and neighbor information etc.
还有连自己的邻居都不认识,你还要到虚拟空间去寻找所谓的网络情人和网络老婆吗?
And even even their neighbors did not know, you have to go looking for the so-called virtual network space and network lover wife?
还有连自己的邻居都不认识,你还要到虚拟空间去寻找所谓的网络情人和网络老婆吗?
And even even their neighbors did not know, you have to go looking for the so-called virtual network space and network lover wife?
应用推荐