• 随意它们分为类:故障服务提供者直接控制网络问题拒绝服务和预订维护

    I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.

    youdao

  • 针对各种各样攻击实施威胁保护必须的,比如拒绝服务攻击(DoS)XML威胁

    Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.

    youdao

  • 拒绝服务攻击经历运营商事件至少会有一些影响轻微服务中断持续破坏关键故障

    Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.

    youdao

  • 看到各种提供商使用验证模型将讨论隐私性法规遵从性方面出现问题针对拒绝服务威胁提供的保护

    You will see the authentication models used by various cloud providers, and examine the challenges which arise from privacy, regulatory compliance, and protection from Denial-of-Service threats.

    youdao

  • 黑客可以恶意实例资源恶意数据请求淹没恶意虚拟邻居,由此实现拒绝服务攻击。

    The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 操作系统确保可用性,可以透明地缓解主动被动网络拒绝服务攻击

    Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.

    youdao

  • 单个多个消息XML拒绝服务XDoS),实施攻击的技术包括元素megatag强制性解析 XML 流

    Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood

    youdao

  • 如果服务CPU内存运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务攻击

    If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 利用分布式拒绝服务DDoS攻击,激进黑客使用僵尸网络服务请求淹没目标网站的方式,网站无法访问

    Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.

    youdao

  • BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • 第一波广泛使用拒绝服务(denial-of-service)攻击当中,次攻击令 Amazon.comeBay等其他网站陷于瘫痪,此类攻击利用虚假流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户不能访问网站。

    eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.

    youdao

  • Cisco已经警告,在InternetOperatingSystem软件具有三个可能引发拒绝服务,运行任意代码系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."

    Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.

    youdao

  • 智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    youdao

  • 比较一般的邮件系统而言,作为一个需要全天候稳定运行电信产品垃圾邮件过滤以及如何发现预防由于垃圾邮件造成系统拒绝服务的要求显得更为迫切。

    As a round-the-clock working telecom product, it is more important to filter spams and discover the denial of service by recerving a mass of junk mails than common mail system.

    youdao

  • 介绍了国际互联网拒绝服务攻击含义现象方法提出一些防范措施

    This paper introduces the implications, phenomena, and methods of the attack of the service denial on the Internet, and offers a few preventive measures.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 对分布式拒绝服务攻击防护,传统方法采用路由访问控制列表过滤的防护方法,无法识别虚假地址针对应用层的攻击,而且容易造成服务无法外部提供正常服务

    The traditional detect method of adopting acl for DOS can not identify the attack aiming at the fake address and application layer, and easily made the server cannot apply the normal service for user.

    youdao

  • 如何避开攻击网络区域数据安全传输至目的地对于减少拒绝服务攻击危害维护网络可用性有着至关重要的意义。

    How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.

    youdao

  • 以下袭击考虑到:人在中间欺骗嗅探拒绝服务

    The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.

    youdao

  • 所有看似漂亮的结构,其性能可用问题可能会非常严重,轻易拒绝服务攻击击垮。

    Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.

    youdao

  • 所有看似漂亮的结构,其性能可用问题可能会非常严重,轻易拒绝服务攻击击垮。

    Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定