Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 57 for attacks (0.1 sec)

  1. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:01:27 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  3. docs/sts/web-identity.py

        return text % make_authorization_url()
    
    
    def make_authorization_url():
        # Generate a random string for the state parameter
        # Save it for use later to prevent xsrf attacks
    
        state = str(uuid4())
        params = {"client_id": client_id,
                  "response_type": "code",
                  "state": state,
                  "redirect_uri": callback_uri,
                  "scope": "openid"}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 28 01:37:51 UTC 2021
    - 2.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java

    import java.util.Collection;
    import java.util.Map;
    import javax.annotation.CheckForNull;
    
    /**
     * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect
     * against hash flooding attacks.
     *
     * @author Louis Wasserman
     */
    @GwtCompatible
    @ElementTypesAreNonnullByDefault
    final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> {
      private final Map<E, Integer> delegateMap;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Feb 22 21:19:52 UTC 2024
    - 3.3K bytes
    - Viewed (0)
  5. code_of_conduct.md

    Examples of unacceptable behavior by participants include:
    
    * The use of sexualized language or imagery and unwelcome sexual attention or
      advances
    * Trolling, insulting/derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or electronic
      address, without explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jan 20 18:38:58 UTC 2020
    - 3.5K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/middleware.md

    {* ../../docs_src/advanced_middleware/tutorial001.py hl[2,6] *}
    
    ## `TrustedHostMiddleware`
    
    Enforces that all incoming requests have a correctly set `Host` header, in order to guard against HTTP Host Header attacks.
    
    {* ../../docs_src/advanced_middleware/tutorial002.py hl[2,6:8] *}
    
    The following arguments are supported:
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 16:45:50 UTC 2024
    - 4K bytes
    - Viewed (0)
  7. CODE_OF_CONDUCT.md

    Examples of unacceptable behavior include:
    
    * The use of sexualized language or imagery, and sexual attention or
      advances of any kind
    * Trolling, insulting or derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or email
      address, without their explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Registered: Sun Nov 03 09:35:10 UTC 2024
    - Last Modified: Thu Oct 17 06:18:13 UTC 2024
    - 5K bytes
    - Viewed (0)
  8. docs/contribute/code_of_conduct.md

       documentation may negatively impact others.
    
     * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions,
       and act with empathy. Do not turn disagreements into personal attacks.
    
     * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We
       strive for transparency within our open source community, and we work closely with upstream
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Feb 06 02:19:09 UTC 2022
    - 5.1K bytes
    - Viewed (0)
  9. docs/pt/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização).
    
    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  10. CODE_OF_CONDUCT.md

    Examples of unacceptable behavior by participants include:
    
    *   The use of sexualized language or imagery and unwelcome sexual attention or
        advances.
    *   Trolling, insulting/derogatory comments, and personal or political attacks.
    *   Public or private harassment.
    *   Publishing others' private information, such as a physical or electronic
        address, without explicit permission.
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Feb 05 18:43:16 UTC 2021
    - 5.2K bytes
    - Viewed (0)
Back to top