DictionaryForumContacts

   English
Terms for subject Microsoft containing attack | all forms | exact matches only
EnglishGerman
brute force attackBrute-Force-Angriff (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
denial of service attackDenial-of-Service-Angriff (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
denial-of-service attackDenial-of-Service-Angriff (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system)
dictionary attackWörterbuchangriff (A method of guessing a user's password or PIN by trying every word in the dictionary until successful)
directory harvest attackVerzeichnisdiebstahl-Angriff (An attempt to collect valid e-mail addresses from a particular organization so that the e-mail addresses can be added to a spam database)
flood attackFlutangriff (" A denial-of-service attack in which a server is "flooded" with requests that cannot be completed. Once flooded, the host can no longer respond to legitimate requests.")
flood attack mitigationFlutabwehr (A configuration setting used by ISA Server to prevent various flood attacks)
hammering attackHammering-Angriff (A key search attack in which an unauthorized user guesses at a PIN or password many times)
insider attackInsiderangriff (An attack originating from inside a protected network)
key search attackAngriff durch Schlüsselsuche (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
land attackLandungsangriff (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail)
luring attackLockangriff (An attack in which the client is lured to voluntarily connect to the attacker)
script injection attackAngriff durch Skripteinschleusung (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code)
SQL injection attackAngriff durch Einschleusung von SQL-Befehlen (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application)
Time Attack ModeZeitspiel (A menu item on the Purble Place menu that allows the user to select a timed mode for their game)
Trojan denial of service attackDoS-Trojaner (A type of Trojan that creates a denial of service attack)