• disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;

    崩溃,譬如分散式拒绝服务袭击旨在使网站运行超载使它瘫痪

    youdao

  • Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.

    事件中有11%涉及扫描探测企图获取信息,0.1%拒绝服务攻击

    youdao

  • This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.

    一点可能不受人们欢迎的,因为通过应用程序传送不合法请求助长拒绝服务攻击

    youdao

  • Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.

    数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。

    youdao

  • This helps prevent malicious denial-of-service attacks that could cause the application to refuse requests because data storage is filled.

    有助于防止恶意拒绝服务攻击,而造成应用程序拒绝要求因为填满资料储存体。

    youdao

  • Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.

    操作系统确保可用性,可以透明地缓解主动被动网络拒绝服务攻击

    youdao

  • One often-forgotten tool is to limit resources, both for storage and for processes. This can be especially useful for limiting denial-of-service attacks.

    限制资源一个经常被遗忘工具包括存储的资源也包括进程资源。

    youdao

  • Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.

    尽管对抗拒绝服务攻击能力逐渐提高,但是DDoS案件在最近五年一直呈上升趋势

    youdao

  • Not only you are risking your brand and precious customer (user) data, but common denial-of-service attacks alone can prevent a company from doing business at all.

    只是自己的品牌珍贵的客户(用户)资料冒险,普通的服务中止攻击完全破坏你的正常业务

    youdao

  • The Web application USES a nonce (a unique string whose value is valid only for a short time) that is included in the POST as a way to guard against denial-of-service attacks.

    Web应用程序使用POST包含nonce(短期有效惟一字符串)防范服务拒绝攻击

    youdao

  • Case in point: the South Ossetia War in which Russian hackers set up websites that enabled anyone sympathetic to their cause to launch denial-of-service attacks against Georgian targets.

    个例子南奥塞梯战争俄罗斯黑客建立网站使得每个人都他们格鲁吉亚目标发起拒绝服务攻击表示同情

    youdao

  • One prevents network operators from blocking lawful traffic, subject to "reasonable network management" (an exception needed to ensure that spam or denial-of-service attacks can be stopped).

    第一条规定按照合理网络管理”的精神,禁止运营商屏蔽合法通讯(一个例外确保垃圾邮件或者拒绝服务的攻击行为被阻止)。

    youdao

  • Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    youdao

  • Not only does this conserve precious wireless bandwidth and reduce latency, it reduces the likelihood that crucial information will be intercepted or interrupted (e.g., by denial-of-service attacks).

    不仅节省了宝贵的无线带宽减少延迟时间而且降低关键信息截取阻断(例如通过拒绝服务攻击)的可能性

    youdao

  • This can help prevent denial of service attacks.

    可以帮助防止拒绝服务攻击

    youdao

  • Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.

    拒绝服务攻击经历运营商事件至少会有一些影响轻微的服务中断持续破坏关键故障

    youdao

  • Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.

    环境有许多其他因素影响性能包括网络使用率服务器其他程序拒绝服务攻击以及电源线断。

    youdao

  • It did crash my browser a couple of times when I loaded malformed content, which makes it vulnerable to denial of service attacks, so I'm hesitant to recommend it for full production use.

    加载混乱内容真的浏览器了,一点容易受到拒绝服务攻击因此知道是否应该推荐真正的产品环境中使用

    youdao

  • Denial of Service attacks are both a security threat and a stability threat.

    拒绝服务攻击既对安全性造成威胁也对稳定性造成威胁。

    youdao

  • The service must be implemented such that it can withstand denial of service attacks and hence remain highly available.

    实现服务时,必须使能够承受服务抵赖攻击从而保持高度可用

    youdao

  • But with denial of service attacks, attackers don't need to gain access to a system.

    进行拒绝服务攻击时,攻击不必获得对系统的控制权。

    youdao

  • In addition, the logging framework does not attempt to protect itself against denial of service attacks.

    此外日志框架本身无法保证日志输出避免外部服务攻击

    youdao

  • Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.

    拒绝服务攻击通常黑客瞄准特定系统闯入系统以便将其用于特定用途

    youdao

  • Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denial of Service,DoS)攻击

    youdao

  • However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.

    尽管如此通过访问解析器读取一个单独文档,就可以进行拒绝服务(DoS)攻击无需任何其他连接

    youdao

  • Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.

    这两种类型实体Web浏览器呈现引擎一起使用时,可能用于创建拒绝服务攻击其他恶意文档

    youdao

  • Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    注意,这里没有考虑一种技术攻击形式拒绝服务(Denial of Service,DoS)攻击。

    youdao

  • Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.

    防止服务的抵赖攻击(denial of service attack):使用XKMS获取密钥信息比较有用,前提是XKMS在需要时候可用并且这一过程能在合理的时间完成。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定