| 1. | This dos attack is only possible if 设置为full的情况下才可能进行此dos攻击。 |
| 2. | One day , a big wolf really did attack the sheep 有一天,狼真的来吃羊了。 |
| 3. | A few days later , a wolf really did attack the boy and his sheep 几天之后,狼真的来袭击小男孩和他的羊了。 |
| 4. | Detecting a p2p dos attack is easy ; defending against it is difficult P2p拒绝服务攻击检测容易,防御困难。 |
| 5. | If mirc is installed , it allows the computer to be used in dos attack 如果安装了mirc ,她会利用受感染的电脑进行dos攻击。 |
| 6. | The exposure to dos attacks is usually shrugged off as the cost of doing business Dos攻击的危害通常不值一提,就象营业成本。 |
| 7. | Like var , this directory is writeable for user processes , making it a target for dos attacks 类似于/ var ,这个目录对用户进程来说是可写的,使得它成为dos攻击的一个目标。 |
| 8. | Preventing dos attacks require different techniques that go well beyond what an application server can provide 防范dos攻击需要不同的技术,这超出了应用服务器所能提供的范围。 |
| 9. | So it is a good idea to have very high engines , ecm and cloak on your ship if you plan on doing attack and runs 如果你打算进行突袭,最好是拥有高等级的发动机、电子对抗措施以及掩护。 |
| 10. | In detail analyzing linux stateful inspection firewall source code , the new defending dos attack method has been 3 .对常见的几种防synflood的dos攻击模型进行了对比分析,改进了一种新的防dos攻击的模型。 |