ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.
ACL使用访问控制条目(ace)控制用户和组的访问权。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
Only legitimate users can access the services (including the denial of spoofing schemes).
只有合法用户能访问服务(包括拒绝欺诈阴谋)。
It is manifested in restricted access to health, education and other essential services and, too often, by the denial or abuse of other fundamental human rights.
它表现在获得保健、教育和其他必要服务的机会受到限制,还往往表现在其他基本人权遭到剥夺或践踏。
Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.
分布式拒绝服务攻击并没有用来侵入后台数据库,这一攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。
ACE, the rules governing extended permissions of access or denial, can be confusing.
ACE是控制授予或拒绝扩展权限的规则,它们可能不容易理解。
ACE, the rules governing extended permissions of access or denial, can be confusing.
ACE是控制授予或拒绝扩展权限的规则,它们可能不容易理解。
应用推荐