ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.
ACL使用访问控制条目(ace)控制用户和组的访问权。
2
But with denial of service attacks, attackers don't need to gain access to a system.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
3
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.