Abstract:
A virtual disk processing method and apparatus belong to the field of storage technologies, where the method includes receiving delete information from a client system of a first virtual machine, determining, according to the delete information, at least one data cluster in a first virtual disk corresponding to a designated file, where the first virtual disk is a virtual disk corresponding to the first virtual machine, setting the at least one data cluster to be available, determining, according to a storage mapping table, a target physical disk block corresponding to the at least one data cluster, where a correspondence between a data cluster in the first virtual disk and a physical disk block is recorded in the storage mapping table, and setting the target physical disk block to be available.
Abstract:
A virtual disk processing method and apparatus belong to the field of storage technologies, where the method includes receiving delete information from a client system of a first virtual machine, determining, according to the delete information, at least one data cluster in a first virtual disk corresponding to a designated file, where the first virtual disk is a virtual disk corresponding to the first virtual machine, setting the at least one data cluster to be available, determining, according to a storage mapping table, a target physical disk block corresponding to the at least one data cluster, where a correspondence between a data cluster in the first virtual disk and a physical disk block is recorded in the storage mapping table, and setting the target physical disk block to be available.
Abstract:
A container license management method and an apparatus, where the method includes receiving an image download request including information for requesting a license from a container management background, obtaining an image according to the image download request, obtaining the information for requesting a license in the image download request, generating a license image layer corresponding to the information for requesting a license, adding the license image layer to the obtained image, and sending, to the container management background, the image to which the license image layer is added such that the container management background starts a container corresponding to the image, and detects whether the license image layer is valid. Hence, container license management efficiency can be improved.
Abstract:
A method, an apparatus, and a device for detecting an electronic mail (E-mail) attack. The device receives a data flow, obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow, and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold.
Abstract:
A method, an apparatus, and a device for detecting an electronic mail (E-mail) attack. The device receives a data flow, obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow, and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold.
Abstract:
A container license management method and an apparatus, where the method includes receiving an image download request including information for requesting a license from a container management background, obtaining an image according to the image download request, obtaining the information for requesting a license in the image download request, generating a license image layer corresponding to the information for requesting a license, adding the license image layer to the obtained image, and sending, to the container management background, the image to which the license image layer is added such that the container management background starts a container corresponding to the image, and detects whether the license image layer is valid. Hence, container license management efficiency can be improved.
Abstract:
A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow; and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold. By applying the disclosed embodiments, a detection result of the E-mail attack is more accurate.
Abstract:
A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow; and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold. By applying the disclosed embodiments, a detection result of the E-mail attack is more accurate.