这可以帮助防止拒绝服务攻击。
而设得过低意味着可能会不必要地拒绝服务。
Too low a setting means you may deny services unnecessarily.
类别:拒绝服务攻击。
这就是黑客进行“拒绝服务”攻击的常见手法。
This is a common method of waging a denial of service attack.
拒绝服务攻击既对安全性造成威胁,也对稳定性造成威胁。
Denial of Service attacks are both a security threat and a stability threat.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
But with denial of service attacks, attackers don't need to gain access to a system.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
拒绝服务:驻留dtd的站点可能由于处理DTD迟缓,而减缓D TD解析。
Denial of service: the site that hosts the DTD can slow the parsing by serving the DTD slowly.
黑客集团已利用一种称为分布式拒绝服务(DDoS)的技术企图使该网站离线。
The hacking group has used a technique known as a distributed denial of service (DDoS) in an attempt to take the sites offline.
有人为分布式拒绝服务攻击辩护,说它是类似于表达不满情绪,是合法的。
Some argue that DDOS attacks are, similarly, a legitimate expression of dissent.
pam_listfile提供根据一个文件的内容允许或拒绝服务的另一种方法。
Pam_listfile provides yet another way to allow or deny services based on the contents of a file.
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
拒绝服务(Denialof Service,DoS)攻击保护。
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
在目前的业务环境中,拒绝服务并不仅仅是一个麻烦的典型;它同时也是一个业务危机。
In today's business environment, denial of service is typically not just an inconvenience; it is a business crisis.
遗憾的是,随着计算机系统在更多关键场合的使用,即使拒绝服务通常也是不可接受的。
Unfortunately, as computer systems become used in more critical situations, even denial of service is often unacceptable.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
而这又反过来使的妇女们不愿意了解自己的感染状态,因为她们不愿意受到不同的待遇甚至被拒绝服务。
This can in turn make women reluctant to find out their status in case they are treated differently or are refused care.
拒绝服务(denial of service)攻击是影响站点可用性的一个最好的例子。
The denial of service attack is one of the best examples of impacting site availability.
我将随意将它们分为四类:故障、不受服务提供者直接控制的网络问题、拒绝服务和预订的维护。
I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.
这一点可能是不受人们欢迎的,因为它会通过向应用程序传送不合法的请求而助长拒绝服务攻击。
This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.
“拒绝服务(denial of service)”这种攻击的技术很粗糙,但却具有破坏性。
“拒绝服务(denial of service)”这种攻击的技术很粗糙,但却具有破坏性。
应用推荐