英語 での Denial-of-service attacks の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Blind denial-of-service attacks are particularly pernicious.
WikiLeaks appears to have become the target of several denial-of-service attacks.
Denial-of-service attacks against opposition Web sites became more frequent.
The readers and back-end databases are vulnerable to denial-of-service attacks.
Hackers often use denial-of-service attacks to try and take down websites and online services.
This service addresses the security concerns raised by denial-of-service attacks.
ICMP messages may be used to attempt denial-of-service attacks by sending back to back erroneous IP packets.
Viruses corrupt files and applications or launch denial-of-service attacks.
Denial-of-Service attacks are an ever-increasing problem and require vast amounts of resources to combat effectively.
Section 5.2 includes a cautionary note that unlimitedlogging can enable certain forms of denial-of-service attacks.
Research into tamper-resistant software, tracebacks of denial-of-service attacks, new methods for mobile agents, etc.
However, denial-of-service attacks based upon flooding leave very large"finger prints"; they should not normally be an important threat.
Similarly, virus hunters should beable to detect the spread of new viruses or denial-of-service attacks early….
The most common applications for botnets include denial-of-service attacks, email spam campaigns, data theft and spreading adware/spyware.
Rogue access points are the most common, but other threats include MAC spoofing attacks, client misconfiguration, and denial-of-service attacks.
To protect the XRP Ledger from being disrupted by spam and denial-of-service attacks, each transaction must destroy a small amount of XRP.
To avoid possible denial-of-service attacks, SIZE requests against files larger than 10240 bytes will be denied if the current transfer type is ASCII.
The breach came to light after tools for waging distributed denial-of-service attacks were found on its network.
KSI is tested daily by McAfee Secure to ensure that the Keeper web application and KSI's Cloud Security Vault are secure from known remote exploits,vulnerabilities and denial-of-service attacks.
The chosen TTLmust be long enough to mitigate denial-of-service attacks and provide reasonable transaction efficiency, and no longer.
This network would provide not only a megaphone to distribute messages of hate, but a platform for future spam,worm and denial-of-service attacks.".
Botnets made up of hacked homerouters were used to launch distributed denial-of-service attacks against the five largest financial organizations in Russia.
You could even kill the session, though only do this if the authentication information is valid(otherwise,this would make it possible for attackers to cause denial-of-service attacks on other users).
For both of these techniques, there is a residual vulnerability to denial-of-service attacks based on replay of valid packets during the lifetime of a data stream.
There will be a need to authenticate and authorize users asking for those QOS values that are expensive in network resources,and it will be necessary to prevent theft of these resources and denial-of-service attacks by others.
The attacker can control it through IRC to cause denial-of-service attacks and install programs that the attacker specifies," said Oliver Friedrichs, senior manager for Symantec's security response team.
Several cell phones produced by SonyEricsson Mobile Communications are vulnerable to denial-of-service attacks, two security companies reported this week.
Malware hunters at Symantec have discovered a direct link between a malicious file embedded in pirated copies of Apple's iWork 09 software and what appears to be the firstMac OS X botnet launching denial-of-service attacks.
It offers protection against denial-of-service attacks and also constitutes the domain structure at all levels of the Ethernet and IP stack- via packet filter, stateful packet inspection(SPI) and deep packet inspection(DPI).
We are concerned about the risk of escalation and retaliation in cyberspace,including massive denial-of-service attacks, damage to critical infrastructure, or other malicious cyber activity that impairs the use and operation of critical infrastructure that provides services to the public.