- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 57 for attacks (0.1 sec)
-
SECURITY.md
### Hardware attacks Physical GPUs or TPUs can also be the target of attacks. [Published research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 16:01:27 UTC 2024 - 4.8K bytes - Viewed (0) -
docs/sts/web-identity.py
return text % make_authorization_url() def make_authorization_url(): # Generate a random string for the state parameter # Save it for use later to prevent xsrf attacks state = str(uuid4()) params = {"client_id": client_id, "response_type": "code", "state": state, "redirect_uri": callback_uri, "scope": "openid"}
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 28 01:37:51 UTC 2021 - 2.9K bytes - Viewed (0) -
guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java
import java.util.Collection; import java.util.Map; import javax.annotation.CheckForNull; /** * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect * against hash flooding attacks. * * @author Louis Wasserman */ @GwtCompatible @ElementTypesAreNonnullByDefault final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> { private final Map<E, Integer> delegateMap;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 22 21:19:52 UTC 2024 - 3.3K bytes - Viewed (0) -
code_of_conduct.md
Examples of unacceptable behavior by participants include: * The use of sexualized language or imagery and unwelcome sexual attention or advances * Trolling, insulting/derogatory comments, and personal or political attacks * Public or private harassment * Publishing others' private information, such as a physical or electronic address, without explicit permission * Other conduct which could reasonably be considered inappropriate in a
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jan 20 18:38:58 UTC 2020 - 3.5K bytes - Viewed (0) -
docs/en/docs/advanced/middleware.md
{* ../../docs_src/advanced_middleware/tutorial001.py hl[2,6] *} ## `TrustedHostMiddleware` Enforces that all incoming requests have a correctly set `Host` header, in order to guard against HTTP Host Header attacks. {* ../../docs_src/advanced_middleware/tutorial002.py hl[2,6:8] *} The following arguments are supported:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 16:45:50 UTC 2024 - 4K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
Examples of unacceptable behavior include: * The use of sexualized language or imagery, and sexual attention or advances of any kind * Trolling, insulting or derogatory comments, and personal or political attacks * Public or private harassment * Publishing others' private information, such as a physical or email address, without their explicit permission * Other conduct which could reasonably be considered inappropriate in a
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Thu Oct 17 06:18:13 UTC 2024 - 5K bytes - Viewed (0) -
docs/contribute/code_of_conduct.md
documentation may negatively impact others. * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions, and act with empathy. Do not turn disagreements into personal attacks. * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We strive for transparency within our open source community, and we work closely with upstream
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 5.1K bytes - Viewed (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização). ### Ataques de Temporização Mas o que é um "timing attack" (ataque de temporização)? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 6.2K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
Examples of unacceptable behavior by participants include: * The use of sexualized language or imagery and unwelcome sexual attention or advances. * Trolling, insulting/derogatory comments, and personal or political attacks. * Public or private harassment. * Publishing others' private information, such as a physical or electronic address, without explicit permission.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Feb 05 18:43:16 UTC 2021 - 5.2K bytes - Viewed (0)