But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
This paper mainly researches into methods to defend against distributed denial of service attacks.
本文主要研究针对此类攻击的有效防范方法。
In addition, the logging framework does not attempt to protect itself against denial of service attacks.
此外,日志框架本身无法保证日志输出避免外部的服务攻击。
Which of the following is a method to defend against denial of service attacks at the victim's website?
下列哪一种方法,以抵御拒绝服务攻击,在受害者的网页?
The service must be implemented such that it can withstand denial of service attacks and hence remain highly available.
实现服务时,必须使其能够承受服务的抵赖攻击,从而保持高度可用。
Due to working in unattended environments, wireless sensor network is vulnerable to a variety of denial of service attacks.
由于无线传感器网络通常工作在无人值守的环境中,因此容易遭受到各种拒绝服务攻击。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Developers should understand the default maximum file size of 4mb is done not randomly but intentionally to prevent denial of service attacks.
开发者应该了解的是,之所以默认的文件大小上限为4MB,并不是因为当时的设计人员灵光一现,而是为了避免潜在DOS攻击危险。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.
防止服务的抵赖攻击(denial of service attack):使用XKMS来获取密钥信息比较有用,前提是XKMS在需要的时候可用,并且这一过程能在合理的时间内完成。
Compared with other algorithms, the algorithm can effectively fight the denial of service attacks from malicious authorized entities in the networks.
与其他算法相比,该算法能有效对抗来自网络的恶意授权实体的拒绝服务攻击。
Also, note that some objects may have a large memory representation and so this quota alone may not be sufficient to prevent Denial of Service attacks.
另外请注意,有些物件可能有大量记忆体表示,因此只靠这个配额可能仍无法防止阻绝服务攻击。
The main advantages include better session key management, improved security, greater availability, anti denial of service attacks and simple authentication.
新结构在密钥管理、全可靠性以及认证方法方面都比传统的结构有较大的改进。
The Bitcoin Foundation has now published an update to its blog post, explaining that denial of service attacks are taking advantage of the malleability issue.
比特币基金会已经发布更新了的博文,解释道,否认服务攻击正是利用了延展性问题。
CloudFlare makes a cloud-based software program that purportedly helps protect websites from security violations such as malware and denial of service attacks.
CloudFlare开发了一款云端软件程序,可以帮助网站免受恶意软件和DoS攻击的威胁。
This property allows you to mitigate denial of service attacks where the attacker submits XML documents that attempt to exceed memory limits via expanding entities.
当攻击者送出尝试利用展开实体来超出记忆体限制的XML文件时,这个属性可让您减轻这类拒绝服务攻击的影响。
In this paper, the mechanism, methods and development to denial of service attacks are discussed firstly. Then, the defense techniques and their respective trends are studied.
本文对拒绝服务攻击及其防范对策做了较深入的研究,尤其在拒绝服务攻击的追踪方面取得了一定的成果。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.
加载混乱的内容时真的有两次把我的浏览器当掉了,这一点很容易受到拒绝服务攻击,因此我不知道是否应该推荐在真正的产品环境中使用它。
Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.
敲诈,通过使用妥协的“蛇神”计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.
如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.
分布式拒绝服务攻击并没有用来侵入后台数据库,这一攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。
However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.
尽管如此,通过访问解析器来读取一个单独的文档,就可以进行拒绝服务(DoS)攻击,无需任何其他连接。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denial of Service,DoS)攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denial of Service,DoS)攻击。
Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.
尽管对抗拒绝服务攻击的能力在逐渐提高,但是DDoS案件在最近五年一直呈上升趋势。
One prevents network operators from blocking lawful traffic, subject to "reasonable network management" (an exception needed to ensure that spam or denial-of-service attacks can be stopped).
第一条规定按照“合理网络管理”的精神,禁止运营商屏蔽合法通讯(一个例外是要确保垃圾邮件或者拒绝服务的攻击行为能被阻止)。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
应用推荐