Перевод: с русского на английский

с английского на русский

malicious attack

См. также в других словарях:

  • Malicious Intent — Studio album by Razor Released April 1986 …   Wikipedia

  • Malicious Intent — Album par Razor Sortie 1986 Enregistrement Waxworks Studios, St. Jacobs, Ontario, Canada Durée 35:38 (Sans K.M.A. Et Mosh) Genre Speed/Thrash M …   Wikipédia en Français

  • Malicious Records — was a German black metal and related record label run by Gerrit Weiher. The label has been defunct since 1997. Most of the bands are from Norway Pure Black Metal roots. There is only little information about this label, because there is no… …   Wikipedia

  • The Malicious Practices Act 1933 — The Malicious Practices Act was passed on the 21st March 1933 in Nazi Germany. It was part of a series of events that occurred within 1933, which marked the brutality and resilience of the Nazi party. From here on life for thousands of Germans… …   Wikipedia

  • Format string attack — Format string attacks are a class of software vulnerability discovered around 1999. Previously thought harmless, Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user… …   Wikipedia

  • IDN homograph attack — The internationalized domain name (IDN) homograph attack is a means by which a malicious party may seek to deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters may have …   Wikipedia

  • DHCP Starvation Attack — Als DHCP Starvation Attack wird ein Angriff auf ein Computernetzwerk bezeichnet, bei dem der gesamte Bereich verfügbarer und durch DHCP vergebener IP Adressen auf einen einzigen Client registriert werden. Die automatische Zuweisung von… …   Deutsch Wikipedia

  • Collision attack — In cryptography, a collision attack on a cryptographic hash tries to find two arbitrary inputs that will produce the same hash value, i.e. a hash collision. In contrast to a preimage attack, neither the hash value nor one of the inputs is… …   Wikipedia

  • Zero day attack — A zero day (or zero hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero day… …   Wikipedia

  • Return-to-libc attack — A return to libc attack is a computer security attack usually starting with a buffer overflow in which the return statement on the stack is replaced by the address of another instruction and an additional portion of the stack is overwritten to… …   Wikipedia

  • UDP flood attack — A UDP flood attack is a denial of service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol. Using UDP for denial of service attacks is not as straightforward as with the Transmission… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»