disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.
这一点可能是不受人们欢迎的,因为它会通过向应用程序传送不合法的请求而助长拒绝服务攻击。
Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.
数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。
This helps prevent malicious denial-of-service attacks that could cause the application to refuse requests because data storage is filled.
这有助于防止恶意的拒绝服务攻击,而造成应用程序拒绝要求,因为在填满资料储存体。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
One often-forgotten tool is to limit resources, both for storage and for processes. This can be especially useful for limiting denial-of-service attacks.
限制资源是一个经常被遗忘的工具,这既包括存储的资源也包括进程的资源。
Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.
尽管对抗拒绝服务攻击的能力在逐渐提高,但是DDoS案件在最近五年一直呈上升趋势。
Not only you are risking your brand and precious customer (user) data, but common denial-of-service attacks alone can prevent a company from doing business at all.
你只是在拿自己的品牌和珍贵的客户(用户)资料冒险,仅就普通的服务中止攻击就会完全破坏你的正常业务。
The Web application USES a nonce (a unique string whose value is valid only for a short time) that is included in the POST as a way to guard against denial-of-service attacks.
Web应用程序使用POST中包含的nonce(值仅在短期内有效的惟一字符串)来防范服务拒绝攻击。
Case in point: the South Ossetia War in which Russian hackers set up websites that enabled anyone sympathetic to their cause to launch denial-of-service attacks against Georgian targets.
举个例子:在南奥塞梯战争中,俄罗斯黑客建立了网站,使得每个人都对他们向格鲁吉亚目标发起拒绝服务攻击表示同情。
One prevents network operators from blocking lawful traffic, subject to "reasonable network management" (an exception needed to ensure that spam or denial-of-service attacks can be stopped).
第一条规定按照“合理网络管理”的精神,禁止运营商屏蔽合法通讯(一个例外是要确保垃圾邮件或者拒绝服务的攻击行为能被阻止)。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Not only does this conserve precious wireless bandwidth and reduce latency, it reduces the likelihood that crucial information will be intercepted or interrupted (e.g., by denial-of-service attacks).
这不仅节省了宝贵的无线带宽和减少了延迟时间,而且降低了关键信息被截取或阻断(例如,通过拒绝服务攻击)的可能性。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.
加载混乱的内容时真的有两次把我的浏览器当掉了,这一点很容易受到拒绝服务攻击,因此我不知道是否应该推荐在真正的产品环境中使用它。
The service must be implemented such that it can withstand denial of service attacks and hence remain highly available.
实现服务时,必须使其能够承受服务的抵赖攻击,从而保持高度可用。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
In addition, the logging framework does not attempt to protect itself against denial of service attacks.
此外,日志框架本身无法保证日志输出避免外部的服务攻击。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denial of Service,DoS)攻击。
However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.
尽管如此,通过访问解析器来读取一个单独的文档,就可以进行拒绝服务(DoS)攻击,无需任何其他连接。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denial of Service,DoS)攻击。
Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.
防止服务的抵赖攻击(denial of service attack):使用XKMS来获取密钥信息比较有用,前提是XKMS在需要的时候可用,并且这一过程能在合理的时间内完成。
CloudFlare makes a cloud-based software program that purportedly helps protect websites from security violations such as malware and denial of service attacks.
CloudFlare开发了一款云端软件程序,可以帮助网站免受恶意软件和DoS攻击的威胁。
应用推荐