disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.
这一点可能是不受人们欢迎的,因为它会通过向应用程序传送不合法的请求而助长拒绝服务攻击。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
One often-forgotten tool is to limit resources, both for storage and for processes. This can be especially useful for limiting denial-of-service attacks.
限制资源是一个经常被遗忘的工具,这既包括存储的资源也包括进程的资源。
Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.
尽管对抗拒绝服务攻击的能力在逐渐提高,但是DDoS案件在最近五年一直呈上升趋势。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
If there are other users of your test machine, they must be aware of your test plans — otherwise they may think they are experiencing some severe problem such as a denial-of-service attack.
如果您的测试计算机上有其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重的问题,例如拒绝服务攻击。
You will see the authentication models used by various cloud providers, and examine the challenges which arise from privacy, regulatory compliance, and protection from Denial-of-Service threats.
您将看到各种云提供商使用的验证模型,并将讨论在隐私性、法规遵从性方面出现的问题和针对拒绝服务威胁提供的保护。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Not only does this conserve precious wireless bandwidth and reduce latency, it reduces the likelihood that crucial information will be intercepted or interrupted (e.g., by denial-of-service attacks).
这不仅节省了宝贵的无线带宽和减少了延迟时间,而且降低了关键信息被截取或阻断(例如,通过拒绝服务攻击)的可能性。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.
我将随意将它们分为四类:故障、不受服务提供者直接控制的网络问题、拒绝服务和预订的维护。
It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.
加载混乱的内容时真的有两次把我的浏览器当掉了,这一点很容易受到拒绝服务攻击,因此我不知道是否应该推荐在真正的产品环境中使用它。
In today's business environment, denial of service is typically not just an inconvenience; it is a business crisis.
在目前的业务环境中,拒绝服务并不仅仅是一个麻烦的典型;它同时也是一个业务危机。
If the change in scale isn't adequately controlled at thousands of workstations, it can impact the one system image in the grid, resulting in resource overloads and possibly denial of service.
如果在数千个工作站都不能充分控制规模变化,则会对网格中的单系统映像造成影响,从而导致资源过载,并且可能导致拒绝服务。
The second soft goal specifies exceptions, such as planned failures, denial of service, scheduled maintenance, network outages, and network issues within the control of a service provider.
第二个软目标指定异常,例如计划的故障、拒绝服务、计划的维护、网络中断和服务提供商控制内的网络问题。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
The service must be implemented such that it can withstand denial of service attacks and hence remain highly available.
实现服务时,必须使其能够承受服务的抵赖攻击,从而保持高度可用。
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
In addition, the logging framework does not attempt to protect itself against denial of service attacks.
此外,日志框架本身无法保证日志输出避免外部的服务攻击。
Unfortunately, as computer systems become used in more critical situations, even denial of service is often unacceptable.
遗憾的是,随着计算机系统在更多关键场合的使用,即使拒绝服务通常也是不可接受的。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
Denial of service: the site that hosts the DTD can slow the parsing by serving the DTD slowly.
拒绝服务:驻留dtd的站点可能由于处理DTD迟缓,而减缓D TD解析。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
应用推荐