• This attack is similar to the ping flood attack but with a clever modification to the process.

    这种攻击类似ping洪水攻击,它能巧妙地修改进程。

    youdao

  • At the low end, a ping flood can be used to uncover information covertly, but throttle up the packets being sent to a target or victim so that now, the system will go offline or suffer slowdowns.

    对于低级攻击,ping用于偷偷地查找信息但是如果要截取目标发送,则要求系统离线停机

    youdao

  • At the low end, a ping flood can be used to uncover information covertly, but throttle up the packets being sent to a target or victim so that now, the system will go offline or suffer slowdowns.

    对于低级攻击,ping用于偷偷地查找信息但是如果要截取目标发送,则要求系统离线停机

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定