Standardize:

DOS (Denial of Service) -> DoS

Most commonly found abbreviated as DoS over DOS throughout the Internet.

Reviewed by:	murray
This commit is contained in:
Chern Lee 2001-07-24 17:28:39 +00:00
parent 7d20b3d5c6
commit 244107c70e
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=10021

View file

@ -1,7 +1,7 @@
<!--
The FreeBSD Documentation Project
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.61 2001/07/20 23:25:04 chern Exp $
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v 1.62 2001/07/23 22:51:33 chern Exp $
-->
<chapter id="security">
@ -77,10 +77,10 @@
</listitem>
</orderedlist>
<indexterm><primary>DOS attacks</primary></indexterm>
<indexterm><primary>DoS attacks</primary></indexterm>
<indexterm>
<primary>security</primary>
<secondary>DOS attacks</secondary>
<secondary>DoS attacks</secondary>
</indexterm>
<indexterm><primary>Denial of Service</primary></indexterm>
@ -619,9 +619,9 @@
<sect2>
<title>Denial of Service Attacks</title>
<indexterm><primary>DOS attacks</primary></indexterm>
<indexterm><primary>DoS attacks</primary></indexterm>
<para>This section covers Denial of Service attacks. A DOS attack
<para>This section covers Denial of Service attacks. A DoS attack
is typically a packet attack. While there is not much you can do
about modern spoofed packet attacks that saturate your network,
you can generally limit the damage by ensuring that the attacks
@ -642,7 +642,7 @@
</listitem>
</orderedlist>
<para>A common DOS attack is against a forking server that attempts
<para>A common DoS attack is against a forking server that attempts
to cause the server to eat processes, file descriptors, and memory
until the machine dies. Inetd (see &man.inetd.8;) has several
options to limit this sort of attack. It should be noted that
@ -713,7 +713,7 @@
<indexterm><primary>ICMP_BANDLIM</primary></indexterm>
<para>Another common DOS attack is called a springboard attack
<para>Another common DoS attack is called a springboard attack
&ndash; to attack a server in a manner that causes the server to
generate responses which then overload the server, the local
network, or some other machine. The most common attack of this