This is an attractive target for hackers who may decide to carry out a denial of service attack.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
If there are other users of your test machine, they must be aware of your test plans — otherwise they may think they are experiencing some severe problem such as a denial-of-service attack.
如果您的测试计算机上有其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重的问题,例如拒绝服务攻击。
Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.
Krebs onSecurity报告称,只需几百美元,你就能到地下论坛上雇个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。
When script kiddies launch an attack, they typically do so without realizing the results of their actions, such as potentially crashing systems or inadvertently performing a denial of service (DoS).
当脚本kiddy启动一个攻击,他们通常不了解这种行为的后果,如潜在地破坏系统或无意识地执行拒绝服务攻击(DoS)。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denial of Service,DoS)攻击。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
The hacker was acquitted in the trial that ensued, but the judgement revealed flaws in the 1990 Police and Justice Bill, consequently amended to ban any and all denial of service attack.
虽然在随后的审判中黑客被无罪释放,但是这也揭示出1990年的Policeand JusticeBill(译者注:英国的警察与司法法案)存在缺陷,从而通过修正案来禁止任何的拒绝服务攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denial of Service,DoS)攻击。
Generally, the group launches a "denial of service" (DDoS) attack, which targets and cripples a specific site.
通常这个团体会对目标发动一次“阻断服务”(DdoS)攻击,目的是要使某个特定网站瘫痪。
If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.
如果服务器CPU和内存的运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.
Cisco已经被警告,在InternetOperatingSystem软件中具有三个可能引发拒绝服务,运行任意代码和系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."
Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).
重用IP地址可能会导致意外的 Denial of Service attack (DoS)。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
Also featured is integrated Denial of service attack prevention technology that provides continuity of service to users in case of an attack.
另一个产品特性是集成了防止拒绝服务攻击的技术,即使受到攻击也能保证连续的服务。
This paper introduces the implications, phenomena, and methods of the attack of the service denial on the Internet, and offers a few preventive measures.
介绍了国际互联网中拒绝服务攻击的含义、现象和方法,并提出了一些防范措施。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
应用推荐