Перевод: с русского на все языки

со всех языков на русский

Trojan denial of service attack

См. также в других словарях:

  • Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to …   Wikipedia

  • denial of service attack —    An attack by an intruder that prevents a computer system from providing a service. A denial of service attack will typically involve opening and dropping a large number of TCP/IP connections very quickly so that the target system spends all… …   Dictionary of networking

  • denial of service attack — ▪ computer science       type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.… …   Universalium

  • Attack patterns — In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.Attack patterns are often used for testing purposes and are very important for ensuring that potential… …   Wikipedia

  • brute-force attack —    A technique employed by intruders that checks every password in a password file against every possible password generated sequentially.    A brute force attack is very clumsy, is usually considered the last resort in an attack, takes a long… …   Dictionary of networking

  • dictionary attack —    An attack by an intruder that checks passwords in a password file against a list of words likely to be used as passwords. Some versions of this attack check the entire language lexicon.    See also brute force attack; denial of service attack; …   Dictionary of networking

  • List of cyber attack threat trends — A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008. [p.9, Lord] * Internet social engineering attacks * Network… …   Wikipedia

  • Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading …   Wikipedia

  • Zombie (computer science) — This article is about the computing term. For the Irish electro band, see Zombie Computer (Band). Zombie virus redirects here. For the use of the term in science fiction, see Zombie apocalypse. In computer science, a zombie is a computer… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»