Skip to main content

Terms

No.TermDescription
1DDoS attacksDistributed Denial of Service (DDoS) refers to the use of client/server technology to unite multiple computers as an attack platform to launch DDoS attacks on one or more targets, thereby doubling the power of denial-of-service attacks
2SQL injectionBy inserting SQL commands into the query string of a web form submission or input domain name or page request, the ultimate goal is to deceive the server into executing malicious SQL commands.
3Flow cleaningThe traffic cleaning service monitors the real-time data traffic entering the computer room and promptly detects abnormal traffic, including DDoS attacks. Clean off abnormal traffic without affecting normal business.
4Password brute force crackingDetermine the approximate range of passwords based on some conditions of password naming rules and verify all possible situations within this range one by one until all situations are verified.
5Website BackdoorA piece of web page code running on the server, mainly composed of ASP and PHP code. Through this code, attackers can perform some dangerous operations on the server, obtain sensitive technical information, or gain control of the server through infiltration and authorization.
6Host intrusion detectionThrough host log security analysis, real-time detection of system password cracking, abnormal IP login and other attack behaviors, and real-time alarm.