{"id":1957,"date":"2012-03-10T22:30:38","date_gmt":"2012-03-10T20:30:38","guid":{"rendered":"https:\/\/infopolicy.net\/?p=1957"},"modified":"2012-03-10T22:30:38","modified_gmt":"2012-03-10T20:30:38","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/infografika-ddos-ataki-iz-vostochnoe-evro\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"\u041e\u0447\u0435\u0440\u0435\u0434\u043d\u0430\u044f \u0438\u043b\u043b\u044e\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u0438\u0437 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u041a\u043e\u0440\u0440\u0435\u0441\u043f\u043e\u043d\u0434\u0435\u043d\u0442.\r\n\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e DDoS \u0430\u0442\u0430\u043a\u0438. \u041d\u0435 \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f, \u0447\u0442\u043e \u0438 \u0411\u0435\u043b\u0430\u0440\u0443\u0441\u044c \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442.\r\n\r\n<img src=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2012\/03\/ddos-attack-ee.jpg\" alt=\"\" title=\"ddos-attack-ee\" width=\"735\" height=\"394\" class=\"alignnone size-full wp-image-1958\" \/>\r\n\r\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0438: Kaspersky Lab.","_ru_post_name":"infografika-ddos-ataki-iz-vostochnoe-evro","_ru_post_excerpt":"","_ru_post_title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430: DDoS \u0430\u0442\u0430\u043a\u0438 \u0438\u0437 \u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0435 \u0415\u0432\u0440\u043e\u043f\u044b","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-1957","post","type-post","status-publish","format-standard","","category-bez-rubriki"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-vz","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":880,"url":"https:\/\/infopolicy.net\/en\/ddos-ataki-otgoloski-2007-goda\/","url_meta":{"origin":1957,"position":0},"title":"DDoS \u0430\u0442\u0430\u043a\u0438: \u043e\u0442\u0433\u043e\u043b\u043e\u0441\u043a\u0438 2007 \u0433\u043e\u0434\u0430","author":"infopolicy","date":"26.04.2009","format":false,"excerpt":"\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u044b\u0435 \u0432\u0435\u0449\u0438 \u0432\u0441\u043f\u043b\u044b\u0432\u0430\u044e\u0442 \u043f\u043e \u043f\u0440\u043e\u0448\u0435\u0441\u0442\u0432\u0438\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043b\u0435\u0442. \u0414\u0435\u043f\u0443\u0442\u0430\u0442 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0434\u0443\u043c\u044b \u0438 \u0447\u043b\u0435\u043d \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0434\u0435\u043b\u0435\u0433\u0430\u0446\u0438\u0438 \u0432 \u041f\u0410\u0421\u0415 \u0421\u0435\u0440\u0433\u0435\u0439 \u041c\u0430\u0440\u043a\u043e\u0432 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0432\u0438\u0437\u0438\u0442\u0430 \u0432 \u0412\u0430\u0448\u0438\u043d\u0433\u0442\u043e\u043d \u0432 \u043c\u0430\u0440\u0442\u0435 2009 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e \u0435\u0433\u043e \u043f\u043e\u043c\u043e\u0449\u043d\u0438\u043a \u0441\u0442\u043e\u044f\u043b \u0437\u0430 DDoS \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u043d\u0430 \u044d\u0441\u0442\u043e\u043d\u0441\u043a\u0438\u0435 \u0441\u0430\u0439\u0442\u044b \u0432 2007 \u0433\u043e\u0434\u0443. \u0426\u0438\u0442\u0430\u0442\u0430 \u0438\u0437 \u0441\u0442\u0430\u0442\u044c\u0438: \u0421\u0430\u043c\u044b\u0435 \u0433\u0440\u043e\u043c\u043a\u0438\u0435 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 17 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 1999\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1015,"url":"https:\/\/infopolicy.net\/en\/10-krupnejshih-amerikanskih-botneta\/","url_meta":{"origin":1957,"position":1},"title":"10 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u0431\u043e\u0442\u043d\u0435\u0442\u0430","author":"infopolicy","date":"23.07.2009","format":false,"excerpt":"\u042d\u0442\u043e \u0441\u0435\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u0432\u0435\u0431\u0441\u0430\u0439\u0442\u044b \u0441\u0432\u043e\u0438\u043c\u0438 DDoS \u0430\u0442\u0430\u043a\u0430\u043c\u0438. \u0423\u0436\u0435 \u043f\u043e\u0434\u0432\u0438\u0434 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0431\u0438\u0437\u043d\u0441\u0430 ;-) America's 10 most wanted botnets Ranked by size and strength, these are the 10 most damaging botnets in the U.S. \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.networkworld.com\/news\/2009\/072209-botnets.html","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9877,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-ddos-ataki-na-mobilnye-s\/","url_meta":{"origin":1957,"position":2},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: DDoS \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u0441\u0435\u0442\u0438","author":"infopolicy","date":"29.07.2017","format":false,"excerpt":"\u041e\u0447\u0435\u043d\u044c \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0438 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435:","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/07\/DDoS-Attacks-Mobile-wireless.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/07\/DDoS-Attacks-Mobile-wireless.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/07\/DDoS-Attacks-Mobile-wireless.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/07\/DDoS-Attacks-Mobile-wireless.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/07\/DDoS-Attacks-Mobile-wireless.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":13165,"url":"https:\/\/infopolicy.net\/en\/13165\/","url_meta":{"origin":1957,"position":3},"title":"Bad Bot Report 2020","author":"infopolicy","date":"01.05.2020","format":false,"excerpt":"\u0412 \u043e\u0442\u0447\u0435\u0442\u0435 Imperva\u2019s 2020 Bad Bot Report \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0435\u0436\u0435\u0434\u043d\u0435\u0432\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0430\u043d\u043e\u0441\u044f\u0442 \u0443\u0449\u0435\u0440\u0431 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u0430\u043c. \u042d\u0442\u043e 7-\u0439 \u0435\u0436\u0435\u0433\u043e\u0434\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u043f\u043b\u043e\u0445\u0438\u0445 \u0431\u043e\u0442\u0430\u0445. \u0423\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u044d\u0442\u043e\u0433\u043e \u043e\u0442\u0447\u0435\u0442\u0430 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043e\u043d \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u043e\u0447\u0435\u043d \u043d\u0430 \u043f\u043b\u043e\u0445\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0431\u043e\u0442\u043e\u0432 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 (\u0443\u0440\u043e\u0432\u0435\u043d\u044c 7 \u043c\u043e\u0434\u0435\u043b\u0438 OSI). \u0410\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043e\u0442\u043b\u0438\u0447\u0430\u044e\u0442\u0441\u044f \u043e\u0442 \u043e\u0431\u044a\u0435\u043c\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a,\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/05\/bot4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/05\/bot4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/05\/bot4.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1739,"url":"https:\/\/infopolicy.net\/en\/belorusskaya-auditoriya-proektov-sup-media\/","url_meta":{"origin":1957,"position":4},"title":"\u0411\u0435\u043b\u043e\u0440\u0443\u0441\u0441\u043a\u0430\u044f \u0430\u0443\u0434\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 SUP Media","author":"infopolicy","date":"16.11.2011","format":false,"excerpt":"\u041d\u043e\u0432\u043e\u0441\u0442\u044c \u0434\u043d\u044f \u0431\u044b\u043b\u0430 \u043d\u043e\u0432\u044b\u0435 \u043a\u0430\u0434\u0440\u043e\u0432\u044b\u0435 \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0432 SUP Media: http:\/\/www.sup.com\/news_390.html \u041f\u0440\u043e \u044d\u0442\u043e \u043d\u0430\u043f\u0438\u0441\u0430\u043b\u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u0431\u0435\u043b\u043e\u0440\u0443\u0441\u0441\u043a\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u0438 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430. \u041d\u043e \u043d\u0438\u043a\u0442\u043e \u043d\u0435 \u0437\u0430\u0434\u0430\u043b\u0441\u044f \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u043c: \u0440\u0430\u0437\u043c\u0435\u0440 \u0431\u0435\u043b\u043e\u0440\u0443\u0441\u0441\u043a\u043e\u0439 \u0430\u0443\u0434\u0438\u0442\u043e\u0440\u0438\u0438 \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 SUP Media \u0432 \u0411\u0435\u043b\u0430\u0440\u0443\u0441\u0438. \u041d\u0435\u043b\u0435\u0433\u043a\u0430\u044f \u0441\u0443\u0434\u044c\u0431\u0430 Livejournal \u0432 \u0411\u0435\u043b\u0430\u0440\u0443\u0441\u0438: \u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u043c\u0443\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a \u0438 \u043b\u0435\u0442\u043d\u0438\u0439 \u0441\u043f\u0430\u0434 \u0441\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u0435 \u0430\u0443\u0434\u0438\u0442\u043e\u0440\u0438\u0438. \u0423\u0434\u0430\u0447\u043d\u044b\u0439 \u0445\u043e\u0434 \u0441\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438&quot;","block_context":{"text":"\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438","link":"https:\/\/infopolicy.net\/en\/category\/bez-rubriki\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2011\/11\/livejournal-by.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2011\/11\/livejournal-by.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2011\/11\/livejournal-by.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1529,"url":"https:\/\/infopolicy.net\/en\/propaganda-takaya-propaganda\/","url_meta":{"origin":1957,"position":5},"title":"\u041f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0430, \u0442\u0430\u043a\u0430\u044f \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0430","author":"infopolicy","date":"01.09.2011","format":false,"excerpt":"\u041d\u0430 \u0441\u0430\u0439\u0442\u0435 RFERL (\u0420\u0430\u0434\u0438\u043e \u0421\u0432\u043e\u0431\u043e\u0434\u0430) \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c As State Media Loses Credibility, Belarus's Independent Press Struggles To Fill Void \u043e\u0431\u0440\u0430\u0442\u0438\u043b \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430: Belarus's blogosphere, known locally as ByNet, is also booming in use, with LiveJournal, Facebook, and Twitter leading the pack of popular social-networking sites. \u042f \u0440\u0435\u0448\u0438\u043b \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c\u0441\u044f\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438&quot;","block_context":{"text":"\u0411\u0435\u0437 \u0440\u0443\u0431\u0440\u0438\u043a\u0438","link":"https:\/\/infopolicy.net\/en\/category\/bez-rubriki\/"},"img":{"alt_text":"","src":"http:\/\/pics.livejournal.com\/infopolicy\/pic\/000c4p43","width":350,"height":200,"srcset":"http:\/\/pics.livejournal.com\/infopolicy\/pic\/000c4p43 1x, http:\/\/pics.livejournal.com\/infopolicy\/pic\/000c4p43 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=1957"}],"version-history":[{"count":1,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1957\/revisions"}],"predecessor-version":[{"id":1959,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1957\/revisions\/1959"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=1957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=1957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=1957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}