Category: Denial of service attack.
类别:拒绝服务攻击。
An example of a denial of service attack.
服务拒绝攻击的一个例子。
Denial of Service (DoS) attack protection.
拒绝服务(Denial of Service,DoS)攻击保护。
This can help prevent denial of service attacks.
这可以帮助防止拒绝服务攻击。
Denial of service attack against the provider's host.
对供应商主机的拒绝式服务攻击。
The “denial of service” attack was crude, but disruptive.
“拒绝服务(denial of service)”这种攻击的技术很粗糙,但却具有破坏性。
This is a common method of waging a denial of service attack.
这就是黑客进行“拒绝服务”攻击的常见手法。
You have experienced a personal denial of service attack.
您就经历了服务拒绝攻击。
Denial of Service attacks are both a security threat and a stability threat.
拒绝服务攻击既对安全性造成威胁,也对稳定性造成威胁。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).
重用IP地址可能会导致意外的 Denial of Serviceattack (DoS)。
The denial of service attack is one of the best examples of impacting site availability.
拒绝服务(denial of service)攻击是影响站点可用性的一个最好的例子。
Denial of service: the site that hosts the DTD can slow the parsing by serving the DTD slowly.
拒绝服务:驻留dtd的站点可能由于处理DTD迟缓,而减缓D TD解析。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
In addition, the logging framework does not attempt to protect itself against denial of service attacks.
此外,日志框架本身无法保证日志输出避免外部的服务攻击。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denial of Service,DoS)攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denial of Service,DoS)攻击。
Generally, the group launches a "denial of service" (DDoS) attack, which targets and cripples a specific site.
通常这个团体会对目标发动一次“阻断服务”(DdoS)攻击,目的是要使某个特定网站瘫痪。
In today's business environment, denial of service is typically not just an inconvenience; it is a business crisis.
在目前的业务环境中,拒绝服务并不仅仅是一个麻烦的典型;它同时也是一个业务危机。
There are third-party products that are available to prevent Denial of Service type of attacks on a Domino Web server.
现在有一些第三方产品可以防止DominoWeb服务器上的拒绝服务型攻击。
The service must be implemented such that it can withstand denial of service attacks and hence remain highly available.
实现服务时,必须使其能够承受服务的抵赖攻击,从而保持高度可用。
Unfortunately, as computer systems become used in more critical situations, even denial of service is often unacceptable.
遗憾的是,随着计算机系统在更多关键场合的使用,即使拒绝服务通常也是不可接受的。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood
单个或多个消息的XML拒绝服务(XDoS),实施攻击的技术包括递归元素、megatag、强制性解析和 XML 流
Developers should understand the default maximum file size of 4mb is done not randomly but intentionally to prevent denial of service attacks.
开发者应该了解的是,之所以默认的文件大小上限为4MB,并不是因为当时的设计人员灵光一现,而是为了避免潜在DOS攻击危险。
应用推荐