{"id":1003,"date":"2010-12-03T08:18:36","date_gmt":"2010-12-03T00:18:36","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/12\/03\/wiki-confidential-data\/"},"modified":"2010-12-03T08:18:36","modified_gmt":"2010-12-03T00:18:36","slug":"wiki-confidential-data","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1003","title":{"rendered":"\u300c\u7dad\u57fa\u89e3\u5bc6\u300d\u88ab\u99ed \u7f8e\u6b50\u700f\u89bd\u505c\u64fa"},"content":{"rendered":"<p>\u65b0\u805e\u4f86\u6e90: \u4e16\u754c\u65b0\u805e\u7db2<\/p>\n<p>slideshow \u300c\u7dad\u57fa\u89e3\u5bc6\u300d\u7db2\u7ad930\u65e5\u4e0a\u5348\u906d\u5230\u7db2\u8def\u99ed\u5ba2\u7684\u5927\u898f\u6a21\u653b\u64ca\uff0c\u5c0e\u81f4\u7f8e\u570b\u548c\u6b50\u6d32\u6c11\u773e\u7121\u6cd5\u9032\u5165\u8a72\u7db2\u7ad9\u700f\u89bd\u90e8\u5206\u5167\u5bb9\uff0c\u5176\u4e2d\u5305\u62ec\u722d\u8b70\u6027\u6975\u5927\u7684\u300c\u96fb\u5831\u9580\u300d\u89e3\u5bc6\u6587\u4ef6\u3002 (\u7de8\u8b6f\u4e2d\u5fc3\u7d9c\u5408\u7d10\u7d0430\u65e5\u96fb)<\/p>\n<p>\u300c\u7dad\u57fa\u89e3\u5bc6\u300d\u906d\u99ed\u5f8c\uff0c\u8feb\u4f7f\u8a72\u7db2\u7ad9\u5c07\u4f3a\u670d\u57fa\u5730\u5f9e\u745e\u5178\u8f49\u81f3\u7f8e\u570b\uff0c\u67b6\u4e0aAmazon\u516c\u53f8\u8a2d\u5728\u7f8e\u570b\u7684\u79df\u8cc3\u4f3a\u670d\u5668\u5f8c\uff0c\u7dad\u57fa\u89e3\u5bc6\u7db2\u7ad9\u624d\u53c8\u958b\u59cb\u904b\u8f49\u3002<\/p>\n<p>\u7dad\u57fa\u89e3\u5bc6\u7db2\u7ad930\u65e5\u5728\u63a8\u7279\u7db2\u7ad9\u767c\u5e03\u77ed\u8a0a\uff0c\u5ba3\u5e03\u7db2\u7ad9\u906d\u5230\u4e86\u300c\u5206\u5e03\u5f0f\u62d2\u7d55\u670d\u52d9\u653b\u64ca\u300d (distributed denial of service attack\uff0c\u5373DDOS\u653b\u64ca)\u3002\u9019\u662f\u99ed\u5ba2\u5e38\u7528\u7684\u4e00\u7a2e\u653b\u64ca\u65b9\u5f0f\uff0c\u4ee5\u4fbf\u6e1b\u7de9\u7db2\u7ad9\u904b\u884c\u901f\u5ea6\u4e43\u81f3\u6700\u7d42\u505c\u64fa\u3002\u4f46\u7dad\u57fa\u89e3\u5bc6\u6c92\u6709\u516c\u5e03\u99ed\u5ba2\u662f\u8ab0\u3002<\/p>\n<p>\u7dad\u57fa\u89e3\u5bc6\u767c\u5e03\u7684\u63a8\u7279\u7c21\u8a0a\u8aaa\uff1a\u300c\u6211\u5011\u76ee\u524d\u906d\u5230\u4e86DDOS\u653b\u64ca\uff0c\u653b\u64ca\u901f\u5ea6\u6bcf\u79d2\u8d85\u904e10\u5104\u5b57\u7bc0(Gigabits)\u3002\u300d<\/p>\n<p>\u7dad\u57fa\u89e3\u5bc6\u7db2\u7ad9\u5728\u516c\u5e03\u6a5f\u5bc6\u96fb\u5831\u768428\u65e5\u7576\u5929\u4e5f\u906d\u5230\u4e86\u99ed\u5ba2\u653b\u64ca\uff0c\u4f4630\u65e5\u7684\u653b\u64ca\u529b\u66f4\u5f37\u3002<\/p>\n<p>\u66fe\u662f\u7dad\u57fa\u89e3\u5bc6\u7db2\u7ad9\u4e3b\u8981\u4f3a\u670d\u57fa\u5730\u7684\u745e\u5178Bahnhof\u7db2\u8def\u516c\u53f8\uff0c30\u65e5\u6c92\u5c0d\u99ed\u5ba2\u653b\u64ca\u505a\u51fa\u8a55\u8ad6\u3002<\/p>\n<p>\u5178\u578b\u7684DDOS\u653b\u64ca\uff0c\u662f\u53d7\u64cd\u7e31\u7684\u9060\u7a0b\u96fb\u8166\u4f7f\u7528\u5927\u91cf\u8cc7\u6599\u8972\u64ca\u67d0\u500b\u7db2\u7ad9\uff0c\u5c0e\u81f4\u7db2\u7ad9\u767c\u751f\u58c5\u585e\uff0c\u8b93\u8a2a\u5ba2\u7121\u6cd5\u9032\u5165\uff0c\u653b\u64ca\u99ed\u5ba2\u7684\u4f4d\u7f6e\u4e5f\u5f88\u96e3\u88ab\u767c\u73fe\u3002<\/p>\n<p>\u7db2\u8def\u5b89\u5168\u516c\u53f8Arbor Network\u8aaa\uff0c\u904e\u53bb\u4e00\u5e74\uff0cDDOS\u653b\u64ca\u5e73\u5747\u6bcf\u79d2\u662f349\u5146\u5b57\u7bc0(megabits)\uff0c\u6bd4\u7dad\u57fa\u89e3\u5bc6\u7db2\u7ad930\u65e5\u906d\u5230\u7684\u653b\u64ca\uff0c\u901f\u5ea6\u616228\u500d\u3002 <\/p>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script> <script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script> <br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u65b0\u805e\u4f86\u6e90: \u4e16\u754c\u65b0\u805e\u7db2 slideshow \u300c\u7dad\u57fa\u89e3\u5bc6\u300d\u7db2\u7ad930\u65e5\u4e0a\u5348\u906d\u5230\u7db2\u8def\u99ed\u5ba2\u7684\u5927\u898f\u6a21\u653b\u64ca\uff0c\u5c0e\u81f4\u7f8e\u570b\u548c\u6b50\u6d32 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1003","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1003"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1003\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}