DictionaryForumContacts

   Czech
Terms containing útok | all forms | exact matches only
SubjectCzechEnglish
comp., MSFiltr útoků phishingPhishing Filter (A filter that helps to identify fraudulent Web sites and protect against personal data theft)
h.rghts.act.fyzický útokphysical abuse
comp., MSinferenční útokinference attack (A type of security threat in which a malicious user is able to derive the value of data without actually accessing it, for example by monitoring the response time to a query)
crim.law., ITkybernetický útokcyber attack
comp., MSmožnosti útokusurface area (The number of ways in which a piece of software can be attacked)
comp., MSOchrana protokolu IPsec proti útokům DoSIPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks)
comp., MSOchrana protokolu IPsec proti útokům s cílem způsobit odepření službyIPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks)
comp., MSpravděpodobnost útoku phishingphishing confidence level (A value between 1 and 8 that is assigned to a message based on its content and that reflects the liklihood that the message is phishing)
h.rghts.act.sexuální útoksexual assault
comp., MSslovníkový útokdictionary attack (A method of guessing a user's password or PIN by trying every word in the dictionary until successful)
gen.teroristický útokterrorist attack
comp., MStrojský program provádějící útok s cílem odepření služebTrojan denial of service attack (A type of Trojan that creates a denial of service attack)
comp., MSweb útoku phishingphishing website (A Web site that impersonates a trustworthy Web site to obtain user's personal or financial information)
comp., MSútok DoSdenial-of-service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
comp., MSútok DoSDoS (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
comp., MSútok DoSdenial of service attack (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
comp., MSútok hammeringhammering attack (A key search attack in which an unauthorized user guesses at a PIN or password many times)
comp., MSútok hrubou siloubrute force attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
comp., MSútok land attackland attack (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail)
comp., MSútok na adresářdirectory harvest attack (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database)
comp., MSútok na dostupnost službydenial of service attack An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system (DOS)
comp., MSútok phishingphishing (A technique used to trick computer users into revealing personal or financial information. A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent Web site)
comp., MSútok prostřednictvím injektáže skriptuscript injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code)
comp., MSútok prostřednictvím injektáže SQLSQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application)
comp., MSútok s cílem zjistit klíčkey search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
comp., MSČasovaný útokTime Attack Mode (A menu item on the Purble Place menu that allows the user to select a timed mode for their game)