• An example of a denial of service attack.

    服务拒绝攻击一个例子

    youdao

  • This is an attractive target for hackers who may decide to carry out a denial of service attack.

    对于希望实施拒绝服务攻击黑客一个有吸引力目标

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.

    分布式拒绝服务攻击需要许多电脑一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。

    youdao

  • If there are other users of your test machine, they must be aware of your test plansotherwise they may think they are experiencing some severe problem such as a denial-of-service attack.

    如果测试计算机上其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重问题例如拒绝服务攻击

    youdao

  • Category: Denial of service attack.

    类别拒绝服务攻击

    youdao

  • Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.

    Krebs onSecurity报告称,只需几百美元地下论坛上个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。

    youdao

  • When script kiddies launch an attack, they typically do so without realizing the results of their actions, such as potentially crashing systems or inadvertently performing a denial of service (DoS).

    脚本kiddy启动一个攻击他们通常了解这种行为后果潜在地破坏系统无意识地执行拒绝服务攻击(DoS)。

    youdao

  • To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).

    实现这些目标攻击可能实施传统DoS分布式拒绝服务(DDoS)攻击

    youdao

  • Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denial of Service,DoS)攻击

    youdao

  • Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.

    利用分布式拒绝服务DDoS攻击,激进黑客使用僵尸网络服务器请求淹没目标网站的方式,网站无法访问

    youdao

  • The hacker was acquitted in the trial that ensued, but the judgement revealed flaws in the 1990 Police and Justice Bill, consequently amended to ban any and all denial of service attack.

    虽然随后审判黑客无罪释放,但是揭示出1990年的Policeand JusticeBill(译者注:英国的警察司法法案)存在缺陷,从而通过修正案禁止任何拒绝服务攻击。

    youdao

  • Denial of Service (DoS) attack protection.

    拒绝服务(Denial of Service,DoS)攻击保护

    youdao

  • Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    注意,这里没有考虑一种技术攻击形式拒绝服务(Denial of Service,DoS)攻击。

    youdao

  • Generally, the group launches a "denial of service" (DDoS) attack, which targets and cripples a specific site.

    通常这个团体会对目标发动一次阻断服务”(DdoS)攻击,目的是要使某个特定网站瘫痪。

    youdao

  • If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.

    如果服务器CPU内存运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • This is a common method of waging a denial of service attack.

    就是黑客进行拒绝服务”攻击常见手法

    youdao

  • Denial of service attack against the provider's host.

    供应商主机拒绝式服务攻击。

    youdao

  • You have experienced a personal denial of service attack.

    经历了服务拒绝攻击

    youdao

  • Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.

    试图破解网络某一安全防护措施以便在未获得授权情况下访问系统或者是遭到服务拒绝

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.

    他们首先尝试DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。

    youdao

  • The denial of service attack is one of the best examples of impacting site availability.

    拒绝服务(denial of service)攻击影响站点可用性的一个最好例子

    youdao

  • The “denial of serviceattack was crude, but disruptive.

    拒绝服务denial of service)”这种攻击的技术粗糙但却具有破坏性。

    youdao

  • The “denial of serviceattack was crude, but disruptive.

    拒绝服务denial of service)”这种攻击的技术粗糙但却具有破坏性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定