但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
But with denial of service attacks, attackers don't need to gain access to a system.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
拒绝服务:驻留dtd的站点可能由于处理DTD迟缓,而减缓D TD解析。
Denial of service: the site that hosts the DTD can slow the parsing by serving the DTD slowly.
黑客集团已利用一种称为分布式拒绝服务(DDoS)的技术企图使该网站离线。
The hacking group has used a technique known as a distributed denial of service (DDoS) in an attempt to take the sites offline.
有人为分布式拒绝服务攻击辩护,说它是类似于表达不满情绪,是合法的。
Some argue that DDOS attacks are, similarly, a legitimate expression of dissent.
pam_listfile提供根据一个文件的内容允许或拒绝服务的另一种方法。
Pam_listfile provides yet another way to allow or deny services based on the contents of a file.
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
在目前的业务环境中,拒绝服务并不仅仅是一个麻烦的典型;它同时也是一个业务危机。
In today's business environment, denial of service is typically not just an inconvenience; it is a business crisis.
遗憾的是,随着计算机系统在更多关键场合的使用,即使拒绝服务通常也是不可接受的。
Unfortunately, as computer systems become used in more critical situations, even denial of service is often unacceptable.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
尽管对抗拒绝服务攻击的能力在逐渐提高,但是DDoS案件在最近五年一直呈上升趋势。
Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.
而这又反过来使的妇女们不愿意了解自己的感染状态,因为她们不愿意受到不同的待遇甚至被拒绝服务。
This can in turn make women reluctant to find out their status in case they are treated differently or are refused care.
我将随意将它们分为四类:故障、不受服务提供者直接控制的网络问题、拒绝服务和预订的维护。
I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.
这一点可能是不受人们欢迎的,因为它会通过向应用程序传送不合法的请求而助长拒绝服务攻击。
This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
尽管如此,通过访问解析器来读取一个单独的文档,就可以进行拒绝服务(DoS)攻击,无需任何其他连接。
However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
第二个软目标指定异常,例如计划的故障、拒绝服务、计划的维护、网络中断和服务提供商控制内的网络问题。
The second soft goal specifies exceptions, such as planned failures, denial of service, scheduled maintenance, network outages, and network issues within the control of a service provider.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denialof Service,DoS)攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
应用推荐