Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 97 for attaches (0.07 seconds)

  1. build-logic/documentation/src/main/groovy/gradlebuild/docs/dsl/docbook/ClassDocSuperTypeBuilder.java

        public ClassDocSuperTypeBuilder(DslDocModel model, GenerationListener listener) {
            this.model = model;
            this.listener = listener;
        }
    
        /**
         * Builds and attaches the supertypes of the given class
         */
        void build(ClassDoc classDoc) {
            ClassMetaData classMetaData = classDoc.getClassMetaData();
            String superClassName = classMetaData.getSuperClassName();
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Tue Feb 18 17:01:38 GMT 2025
    - 2.1K bytes
    - Click Count (0)
  2. docs/fr/docs/advanced/security/http-basic-auth.md

        # Renvoyer une erreur
        ...
    ```
    
    Mais en utilisant `secrets.compare_digest()`, cela sera sécurisé contre un type d'attaques appelé « attaques par chronométrage ».
    
    ### Attaques par chronométrage { #timing-attacks }
    
    Mais qu'est-ce qu'une « attaque par chronométrage » ?
    
    Imaginons que des attaquants essaient de deviner le nom d'utilisateur et le mot de passe.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 5.8K bytes
    - Click Count (0)
  3. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks { #timing-attacks }
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 5K bytes
    - Click Count (0)
  4. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
  5. .github/ISSUE_TEMPLATE/tflite-in-play-services.md

    the problem. If possible, please share a link to or attach code demonstrating
    the problem.
    
    **Any other info / logs**
    Include any logs or source code that would be helpful to diagnose the problem.
    If including tracebacks, please include the full traceback. Large logs and files
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Jun 15 03:35:58 GMT 2022
    - 880 bytes
    - Click Count (0)
  6. .github/ISSUE_TEMPLATE/tflite-converter-issue.md

    ```
    (You can paste links or attach files by dragging & dropping them below)
    - Provide links to your updated versions of the above two colab notebooks.
    - Provide links to your TensorFlow model and (optionally) TensorFlow Lite Model.
    ```
    
    #### Option B: Paste your code here or provide a link to a custom end-to-end colab
    
    ```
    (You can paste links or attach files by dragging & dropping them below)
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Jun 15 03:35:58 GMT 2022
    - 2.1K bytes
    - Click Count (0)
  7. docs/en/docs/advanced/strict-content-type.md

    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  8. docs/multi-user/admin/README.md

    ### 3. Configure `mc` and create another user user1 with attached policy user1policy
    
    ```
    mc alias set myminio-admin1 http://localhost:9000 admin1 admin123 --api s3v4
    
    mc admin user add myminio-admin1 user1 user123
    mc admin policy attach myminio-admin1 user1policy ~/user1policy.json
    mc admin policy attach myminio-admin1 user1policy --user=user1
    ```
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 4.7K bytes
    - Click Count (0)
  9. helm/minio/templates/_helper_create_user.txt

      if [ ! -z $POLICY -a $POLICY != " " ] ; then
          echo "Adding policy '$POLICY' for '$USER'"
          set +e ; # policy already attach errors out, allow it.
          ${MC} admin policy attach myminio $POLICY --user=$USER
          set -e
      else
          echo "User '$USER' has no policy attached."
      fi
    }
    
    # Try connecting to MinIO instance
    {{- if .Values.tls.enabled }}
    scheme=https
    {{- else }}
    scheme=http
    {{- end }}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Dec 12 23:43:32 GMT 2023
    - 3.2K bytes
    - Click Count (0)
  10. docs/tr/docs/advanced/security/http-basic-auth.md

        # Bir hata döndür
        ...
    ```
    
    Ancak `secrets.compare_digest()` kullanarak, "timing attacks" denilen bir saldırı türüne karşı güvenli olursunuz.
    
    ### Timing Attacks { #timing-attacks }
    
    Peki "timing attack" nedir?
    
    Bazı saldırganların kullanıcı adı ve şifreyi tahmin etmeye çalıştığını düşünelim.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 5.5K bytes
    - Click Count (0)
Back to Top