• DDoS attacks are surprisingly low tech.

    DDoS攻击惊人的技术

    youdao

  • Some of the more common DDoS attacks include.

    比较常见DDoS攻击包括

    youdao

  • Here are the DDOS attacks so far by target.

    以下目前发现DDOS的攻击目标。

    youdao

  • Some argue that DDOS attacks are, similarly, a legitimate expression of dissent.

    有人分布式拒绝服务攻击辩护,说它类似于表达不满情绪,合法

    youdao

  • DDoS attacks bombard a website with data until it cannot respond, rendering it inaccessible.

    DDoS轰击数据网站直到不能回应导致无法访问。

    youdao

  • EveryDNS.net serves about 500, 000 websites that could be in jeopardy due to the continuous DDOS attacks on the Wikileaks site.

    由于对wikileaks.org连续进行洪水攻击500 .,000家EveryDNS.net服务的网站处在危险境地。

    youdao

  • DDOS attacks have become relatively commonplace online, but this is believed to be the first time that Twitter has been targeted.

    DDOS攻击在网上已经相当普遍估计Twitter第一成为攻击目标

    youdao

  • The furtive, nameless nature of DDOS attacks disqualifies them from protection; their anonymous perpetrators look like cowardly hooligans, not heroes.

    分布式拒绝服务攻击鬼鬼祟祟,隐名进行的特性让抗议者们不可能获得保护这些匿名作案者看起来更像流氓而不是英雄

    youdao

  • Super DDOS attacks, the following line bandwidth consumption the others upstream bandwidth, home computers can be easily knocked down the server!

    说明:超强ddos攻击器,以下带宽消耗别人上行带宽,家庭电脑轻易击倒服务器!

    youdao

  • The group's attacks were initially mounted as a response to the MPAA contracted firm, Aiplex Software, who used DDoS attacks to take down the Pirate Bay in September.

    这一团体攻击最初是对MPAA合约公司Aiplex Soft ware的个反击,Aiplex9月份采用DDoS攻击海盗

    youdao

  • "If they want to participate, it's very easy for them to download a tool that hands over your computer to Anonymous" - and which then allows them to take part in DDoS attacks.

    如果他们加入非常容易下载黑客软件工具,并把自己电脑加入Anonymous”——然后运行,加入到集体ddos攻击来。

    youdao

  • The failure of Anonymous to take down Amazon (by either lack of support or strength of server) shows that the future of DDoS attacks lies only with the "hacktivists" themselves.

    匿名者攻击amazon失败(因为缺少支持或者服务器能力有限)表明DDoS攻击的未来黑客行为主义者”自己有关。

    youdao

  • The key element shared by all the targets of DDoS attacks in the last week has been an inability to cope with a decade-old threat. However, this is not to do with a lack of preparation.

    上个星期DDoS攻击目标关键共同点就是无法应付这个已经出现十年的威胁,而且了防备的情况下。

    youdao

  • The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.

    随着DDoS攻击开始有组织犯罪以发起网络攻击为威胁成为敲诈勒索公司钱财手段,这个技术肮脏的一面开始闪现。

    youdao

  • In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.

    注意到,黑客内部阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还够格被称作真正的“黑”。真正的“黑”是要对网络造成真正的危害而不是暂时关掉一个网站。

    youdao

  • Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.

    僵尸网络通常用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击可以通过使流量过载的方式使网络服务器瘫痪;这种新的攻击不同。

    youdao

  • Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.

    尽管对抗拒绝服务攻击能力逐渐提高,但是DDoS案件在最近五年一直呈上升趋势

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • To resolve the problem of detecting Distributed Denial of Service (DDoS) attacks, a dynamic threshold detection method based on fuzzy logic was proposed.

    针对分布式拒绝服务攻击检测问题提出基于模糊逻辑动态阈值检测方法

    youdao

  • In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.

    提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。

    youdao

  • In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.

    提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定