• Category: Denial of service attack.

    类别拒绝服务攻击

    youdao

  • An example of a denial of service attack.

    服务拒绝攻击一个例子

    youdao

  • You have experienced a personal denial of service attack.

    经历了服务拒绝攻击

    youdao

  • Denial of service attack against the provider's host.

    供应商主机拒绝式服务攻击。

    youdao

  • This is a common method of waging a denial of service attack.

    就是黑客进行拒绝服务”攻击常见手法

    youdao

  • Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).

    重用IP地址可能导致意外的 DenialofService attack (DoS)。

    youdao

  • The denial of service attack is one of the best examples of impacting site availability.

    拒绝服务(denial of service)攻击影响站点可用性的一个最好例子

    youdao

  • A kind of soft defense system model to distribute denial service attack is proposed.

    提出了分布式拒绝服务攻击防御系统模型

    youdao

  • IP traceback is an important way to defend against distributed denial of service attack.

    IP追踪防御分布式拒绝服务攻击重要方法

    youdao

  • This is an attractive target for hackers who may decide to carry out a denial of service attack.

    对于希望实施拒绝服务攻击黑客一个有吸引力目标

    youdao

  • They include a massive denial of service attack on the official website, and a virus getting onto organisers' computers.

    它们包括官方网站进行的大规模攻击使其拒绝服务登陆组织者计算机病毒

    youdao

  • The only thing that was affected by the denial-of-service attack was our website, "the official said, declining to be named."

    这场‘拒绝服务’黑客攻击下,唯一受到影响我们网站

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.

    分布式拒绝服务攻击需要许多电脑一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。

    youdao

  • Denial of service attack is among the hardest security problems to address because it is easy to launch, difficult to defend and trace.

    拒绝服务攻击由于容易实施难于防范、难以追踪,成为最难解决的网络安全问题之一。

    youdao

  • Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key.

    删除密钥容器可能导致拒绝服务攻击因为阻止使用通过密钥加密签名过文件

    youdao

  • Also featured is integrated Denial of service attack prevention technology that provides continuity of service to users in case of an attack.

    产品特性集成防止拒绝服务攻击技术,即使受到攻击也能保证连续的服务。

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • NOTE: This makes it harder for a script to perform a denial-of - service attack by just opening a large number of WebSocket connections to a remote host.

    注意使得通过一个脚本远程服务器打开大量连接的方式进行“拒绝服务攻击”更困难。

    youdao

  • This makes it possible for the hacker to launch a denial-of-service attack, making it difficult or impossible for authorized use to obtain authentication.

    使得黑客可以发动拒绝服务攻击使授权使用困难不可能获得认证

    youdao

  • The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.

    各种洪水式拒绝服务攻击比较容易检测难于防范因为它们通过种简单自然、“正常渠道发起的攻击。

    youdao

  • In addition, a denial-of-service attack can be launched on a wider scale than attacks performed by script kiddies, making them more difficult to investigate.

    此外拒绝服务攻击可以脚本小子攻击的范围广,调查弄清他们的身份也更难。

    youdao

  • The hacker was acquitted in the trial that ensued, but the judgement revealed flaws in the 1990 Police and Justice Bill, consequently amended to ban any and all denial of service attack.

    虽然随后审判黑客无罪释放,但是揭示出1990年的Policeand JusticeBill(译者注:英国的警察司法法案)存在缺陷,从而通过修正案禁止任何拒绝服务攻击。

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定