- 1、本文档共10页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
FTP干事器能够遭到的进击(国外英文资料)
FTP服务器可能受到的攻击
One, the FTP server might be attacked
Though the Windows operating system class server, simple operation, easy configuration, but Microsoft operating system vulnerabilities emerge in endlessly, if the server with Windows as operating system, the administrator is never free, to focus on whether Microsoft released any new patches, announced what new vulnerabilities, and then on the patch in the fastest time, see the holes, and a lot of hacking tools are also online for Windows, but understand a little computer knowledge can operation, so for a little bit important server, in order to ensure the safety of server administrator are no longer willing to use Windows system, but the Unix server. The operation of the Unix operating system than Windows operating system is much more complex, at least can hold off the kind of person who will only use Windows system, and its security is much higher. The attack on Unix server is relatively difficult, but this does not mean that there is no attack, for this type of server, may be the following two types of attacks.
Denial of service attacks
DoS ( of a Service, Denial of Service), is a kind of reasonable use of the Service request takes up too much Service resources, so that legitimate users cannot get Service response network attacks. Due to the DoS attack is a typical resource depletion and resource overload, so when a reasonable request for resources greatly exceeds the ability to pay of the resources, legitimate visitors will not be able to enjoy a reasonable service.
A service overload occurs when a number of service requests are sent to the same servers service daemon when a DoS attack occurs. These requests are made in various ways, and many of them are deliberate. In a time-sharing system, the computer to deal with these to prevent a flood of requests, very busy, so cant handle routine tasks, many new request will be discarded. If the target of an attack is a service based on a TCP protocol, these requests wi
文档评论(0)