我将随意将它们分为四类:故障、不受服务提供者直接控制的网络问题、拒绝服务和预订的维护。
I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
您将看到各种云提供商使用的验证模型,并将讨论在隐私性、法规遵从性方面出现的问题和针对拒绝服务威胁提供的保护。
You will see the authentication models used by various cloud providers, and examine the challenges which arise from privacy, regulatory compliance, and protection from Denial-of-Service threats.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
单个或多个消息的XML拒绝服务(XDoS),实施攻击的技术包括递归元素、megatag、强制性解析和 XML 流
Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood
如果服务器CPU和内存的运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击。
If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
Cisco已经被警告,在InternetOperatingSystem软件中具有三个可能引发拒绝服务,运行任意代码和系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."
Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
相比较一般的邮件系统而言,作为一个需要全天候稳定运行的电信产品,对垃圾邮件过滤以及如何发现和预防由于垃圾邮件造成系统拒绝服务的要求显得更为迫切。
As a round-the-clock working telecom product, it is more important to filter spams and discover the denial of service by recerving a mass of junk mails than common mail system.
介绍了国际互联网中拒绝服务攻击的含义、现象和方法,并提出了一些防范措施。
This paper introduces the implications, phenomena, and methods of the attack of the service denial on the Internet, and offers a few preventive measures.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
对分布式拒绝服务攻击的防护,传统的方法是采用路由访问控制列表过滤的防护方法,无法识别虚假地址和针对应用层的攻击,而且容易造成服务器无法向外部提供正常的服务。
The traditional detect method of adopting acl for DOS can not identify the attack aiming at the fake address and application layer, and easily made the server cannot apply the normal service for user.
如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。
How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.
以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.
所有看似漂亮的结构,其性能和可用性问题可能会非常严重,会轻易被拒绝服务攻击击垮。
Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.
所有看似漂亮的结构,其性能和可用性问题可能会非常严重,会轻易被拒绝服务攻击击垮。
Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.
应用推荐