Category: Denial of service attack.
类别:拒绝服务攻击。
An example of a denial of service attack.
服务拒绝攻击的一个例子。
You have experienced a personal denial of service attack.
您就经历了服务拒绝攻击。
Denial of service attack against the provider's host.
对供应商主机的拒绝式服务攻击。
This is a common method of waging a denial of service attack.
这就是黑客进行“拒绝服务”攻击的常见手法。
Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).
重用IP地址可能会导致意外的 DenialofService attack (DoS)。
The denial of service attack is one of the best examples of impacting site availability.
拒绝服务(denial of service)攻击是影响站点可用性的一个最好的例子。
A kind of soft defense system model to distribute denial service attack is proposed.
提出了一种分布式拒绝服务攻击的软防御系统模型。
IP traceback is an important way to defend against distributed denial of service attack.
IP追踪是防御分布式拒绝服务攻击的重要方法。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
They include a massive denial of service attack on the official website, and a virus getting onto organisers' computers.
它们包括对官方网站进行的大规模攻击,使其拒绝服务,并能登陆组织者计算机的病毒。
The only thing that was affected by the denial-of-service attack was our website, "the official said, declining to be named."
在这场‘拒绝服务’黑客攻击下,唯一受到影响的是我们的网站。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
Denial of service attack is among the hardest security problems to address because it is easy to launch, difficult to defend and trace.
拒绝服务攻击由于容易实施、难于防范、难以追踪,成为最难解决的网络安全问题之一。
Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key.
删除密钥容器可能导致拒绝服务攻击,因为它阻止使用通过密钥加密或签名过的文件。
Also featured is integrated Denial of service attack prevention technology that provides continuity of service to users in case of an attack.
另一个产品特性是集成了防止拒绝服务攻击的技术,即使受到攻击也能保证连续的服务。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
NOTE: This makes it harder for a script to perform a denial-of - service attack by just opening a large number of WebSocket connections to a remote host.
注意:这使得通过一个脚本向远程服务器打开大量的连接的方式进行“拒绝服务攻击”更困难。
This makes it possible for the hacker to launch a denial-of-service attack, making it difficult or impossible for authorized use to obtain authentication.
这使得黑客可以发动拒绝服务攻击,使授权使用困难或不可能获得认证。
The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.
各种“洪水式”拒绝服务攻击比较容易检测,但却难于防范,因为它们是通过一种简单、自然、“正常”渠道发起的攻击。
In addition, a denial-of-service attack can be launched on a wider scale than attacks performed by script kiddies, making them more difficult to investigate.
此外,拒绝服务攻击可以比脚本小子攻击的范围更广,调查弄清他们的身份也更难。
The hacker was acquitted in the trial that ensued, but the judgement revealed flaws in the 1990 Police and Justice Bill, consequently amended to ban any and all denial of service attack.
虽然在随后的审判中黑客被无罪释放,但是这也揭示出1990年的Policeand JusticeBill(译者注:英国的警察与司法法案)存在缺陷,从而通过修正案来禁止任何的拒绝服务攻击。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
应用推荐