• That was a "DoS attack" on our activation service (laughs) - the head of operations in America called up the VP marketing in America and said, "What did you do?"

    就是我们激活服务一个阻断服务攻击”()——美国运营负责人打电话给美国营销副总裁:“都做什么? ”?

    youdao

  • Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.

    针对各种各样攻击实施威胁保护必须的,比如拒绝服务攻击(DoS)XML威胁。

    youdao

  • When script kiddies launch an attack, they typically do so without realizing the results of their actions, such as potentially crashing systems or inadvertently performing a denial of service (DoS).

    脚本kiddy启动一个攻击他们通常了解这种行为后果潜在地破坏系统无意识地执行拒绝服务攻击(DoS)。

    youdao

  • To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).

    实现这些目标攻击可能实施传统DoS分布式拒绝服务(DDoS)攻击

    youdao

  • Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    注意,这里没有考虑一种技术攻击形式拒绝服务(Denialof Service,DoS)攻击。

    youdao

  • Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denialof Service,DoS)攻击

    youdao

  • However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.

    尽管如此通过访问解析器读取一个单独文档,就可以进行拒绝服务(DoS)攻击无需任何其他连接

    youdao

  • Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).

    重用IP地址可能导致意外的 DenialofServiceattack (DoS)。

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • The constraints protect against a class of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.

    这些约束可以抵御某种类型拒绝服务(DOS)攻击,这些攻击试图利用消息复杂性占用终结点处理资源

    youdao

  • The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.

    这些约束可以抵御某种类型拒绝服务DOS攻击,这些攻击试图利用消息复杂性占用终结点处理资源。

    youdao

  • The traditional detect method of adopting acl for DOS can not identify the attack aiming at the fake address and application layer, and easily made the server cannot apply the normal service for user.

    对分布式拒绝服务攻击防护,传统方法采用路由访问控制列表过滤的防护方法,无法识别虚假地址针对应用层的攻击,而且容易造成服务器无法外部提供正常的服务。

    youdao

  • Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.

    随机数据包标记PPM拒绝服务攻击进行IP回溯一种实用有效方法

    youdao

  • Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.

    随机数据包标记PPM拒绝服务攻击进行IP回溯一种实用有效方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定