attack vt. 1.攻击 (opp. defend)。 2.非难,抨击。 3.着手,动手,投入。 4.(疾病)侵袭。 5.【化学】腐蚀。 We will not attack unless we are attacked; if we are attacked, we will certainly counter- attack。 人不犯我,我不犯人;人若犯我,我必犯人。 attack a task 动手工作。 attack a problem 着手解决问题。 Strong acids attack metals. 强酸对金属有腐蚀作用。 be attacked with (a disease) 害(病)。 n. 1.攻击 (opp. defense), 袭击。 2.抨击。 3.【航空】迎角,冲角,攻角。 4.着手,动手。 5.发作,发病。 6.(表演或竞赛中的)主动。 A- is the best defense. 进攻是最好的防御。 an attack formation 攻击队形。 have an attack of 为…所侵袭;害,患(病)。 make an attack on 攻击。 n. -er 攻击者。
So , doing research on dos attack and its counter - measures is not only challenging but also very important 同时,拒绝服务攻击也将是未来信息战的重要手段之一。因此,研究拒绝服务攻击及其对策是极为重要的。
The only one worth mentioning ; everything since its simply tormenting folks for nothing . oh , well , uncle , we did attack them the day before yesterday “只有这一场战斗令人难忘而在此之后的一切只是折磨人罢了。 ”
By simulating results , the main characteristic of dos attack are concluded , which is the basis to improve security mechanism 通过安全性能仿真试验,分析了该方案的优点,验证了此方案对拒绝服务攻击有效的防御性能。
In this paper , the basic research of stateful inspection firewall has been made , enumerating the basic principle and method of dos attack 2 .对常见dos攻击的原理和方法进行了讨论,给出了一些常见的防dos攻击的防御方法。
By putting it on a separate file system , the data cannot fill up your entire free disk space if you are the target of a dos attack 通过将其安放于一个单独的文件系统,如果您成为某个dos攻击的目标,则数据不会填满您全部的空闲空间。
To mitigate the effects of dos attacks that try to fill the available disk space , make sure you plan dedicated partitions for at least these directories 要减少那种试图填满可用磁盘空间的dos攻击带来的影响,请确保您至少为下面这些目录计划专门的分区:
Dos attacks may be intentional - like when someone deliberately jams the frequency - or unintentionally generated when someone heats up soup in the office microwave Dos攻击也许是有意的比如当某人故意堵塞某个频率时或者是无意造成的,就象某人在办公室的微波炉里加热汤。
Dos attack is a very important network attack meanings , mainly using the bug of network protocol designing , it can make much loss in the other side it is hardly prevented Dos攻击作为网络攻击中的一个重要手段,主要是利用网络协议设计上的漏洞,造成的损失大,并且难以防范。
Then the writer introduces the process of hackers attacking wireless network and the using tools by hackers , because only after we know how the enemy " do attack " , we can know how " guard against " as far as possible 接着作者介绍了黑客攻击无线网络的过程和使用的工具,因为只有知道了敌人是如何“攻” ,我们才能知道如何尽可能地“防” 。