Перевод: со всех языков на все языки

со всех языков на все языки

compromise an attack

См. также в других словарях:

  • compromise — 01. It is going to be difficult to find a [compromise] between the two groups because their needs are so different. 02. I wanted $100 for my bicycle, and he offered me $50, so we eventually [compromised] at $75. 03. This government seems to… …   Grammatical examples in English

  • Attack on the Sui-ho Dam — Infobox Military Conflict conflict=Attack on the Sui ho Dam partof=Korean War caption= date=June 23–June 24, 1952 place=Sui Ho (Sup ung ho), Choshin (Changjin, Fusen (Pujǒn), and Kyosen (P ungsan), North Korea result=United Nations victory… …   Wikipedia

  • Random number generator attack — The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic… …   Wikipedia

  • Zero-day attack — This article is about technical vulnerabilities. For other uses, see Zero day (disambiguation). A zero day (or zero hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are… …   Wikipedia

  • Correlation attack — In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the output of several linear feedback shift registers (called LFSRs for the rest of this article)… …   Wikipedia

  • Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer …   Wikipedia

  • Zero day attack — A zero day (or zero hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero day… …   Wikipedia

  • Twinge attack — An Internet based computer networking term. A Twinge attack is a flood of false ICMP packets in an attempt to cripple a system. The attack is spoofed, that is random fake Internet source addresses are used which makes it impossible to identify… …   Wikipedia

  • Small subgroup confinement attack — In cryptography, a subgroup confinement attack (or small subgroup confinement attack) on a cryptographic method that operates in a large finite group is where an attacker attempts to compromise the method by forcing a key to be confined to an… …   Wikipedia

  • denial of service attack — ▪ computer science       type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.… …   Universalium

  • United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… …   Universalium

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»