-
1 программа-троян типа отказ в обслуживании
Microsoft: Trojan denial of service attackУниверсальный русско-английский словарь > программа-троян типа отказ в обслуживании
См. также в других словарях:
Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to … Wikipedia
denial of service attack — An attack by an intruder that prevents a computer system from providing a service. A denial of service attack will typically involve opening and dropping a large number of TCP/IP connections very quickly so that the target system spends all… … Dictionary of networking
denial of service attack — ▪ computer science type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.… … Universalium
Attack patterns — In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.Attack patterns are often used for testing purposes and are very important for ensuring that potential… … Wikipedia
brute-force attack — A technique employed by intruders that checks every password in a password file against every possible password generated sequentially. A brute force attack is very clumsy, is usually considered the last resort in an attack, takes a long… … Dictionary of networking
dictionary attack — An attack by an intruder that checks passwords in a password file against a list of words likely to be used as passwords. Some versions of this attack check the entire language lexicon. See also brute force attack; denial of service attack; … Dictionary of networking
List of cyber attack threat trends — A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008. [p.9, Lord] * Internet social engineering attacks * Network… … Wikipedia
Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
Zombie (computer science) — This article is about the computing term. For the Irish electro band, see Zombie Computer (Band). Zombie virus redirects here. For the use of the term in science fiction, see Zombie apocalypse. In computer science, a zombie is a computer… … Wikipedia