Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 439 for attack (0.17 sec)

  1. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

          HeldCertificate.Builder()
            .serialNumber(1L)
            .certificateAuthority(4)
            .commonName("attacker ca")
            .build()
        val attackerIntermediate =
          HeldCertificate.Builder()
            .serialNumber(2L)
            .certificateAuthority(3)
            .commonName("attacker")
            .signedBy(attackerCa)
            .build()
        val pinnedRoot =
          HeldCertificate.Builder()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/RegularImmutableMap.java

       * saving space.
       */
      @VisibleForTesting static final double MAX_LOAD_FACTOR = 1.2;
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting static final double HASH_FLOODING_FPP = 0.001;
    
      /**
       * Maximum allowed length of a hash table bucket before falling back to a j.u.HashMap based
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 28 18:11:09 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  3. docs/features/https.md

    By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Dec 24 00:16:30 UTC 2022
    - 10.5K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java

            br.addElement("Against for CVE-2014-0050 (JVN14876762).");
            br.addElement("Boundary size is limited by Framework.");
            br.addElement("Too long boundary is treated as 404 because it's thought of as attack.");
            br.addElement("");
            br.addElement("While, you can override the boundary limit size");
            br.addElement(" in " + getClass().getSimpleName() + ".");
            br.addItem("Content Type");
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Oct 23 13:27:21 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  5. guava/src/com/google/common/collect/RegularImmutableBiMap.java

      /**
       * @throws IllegalArgumentException if another entry in the bucket has the same key
       * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash
       *     flooding attack
       */
      private static void checkNoConflictInValueBucket(
          Object value, Entry<?, ?> entry, @CheckForNull ImmutableMapEntry<?, ?> valueBucketHead)
          throws BucketOverflowException {
        int bucketSize = 0;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  6. docs/security/README.md

    #### Secure Erasure and Locking
    
    The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/CompactHashSet.java

      @VisibleForTesting @CheckForNull transient @Nullable Object[] elements;
    
      /**
       * Keeps track of metadata like the number of hash table bits and modifications of this data
       * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note
       * that we choose not to make this volatile, so we do less of a "best effort" to track such
       * errors, for better performance.
       */
      private transient int metadata;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/CompactHashSet.java

      @VisibleForTesting @CheckForNull transient @Nullable Object[] elements;
    
      /**
       * Keeps track of metadata like the number of hash table bits and modifications of this data
       * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note
       * that we choose not to make this volatile, so we do less of a "best effort" to track such
       * errors, for better performance.
       */
      private transient int metadata;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24.9K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/math/Quantiles.java

     * passing in unsanitized user data then a malicious user could force it. A light shuffle of the
     * data using an unpredictable seed should normally be enough to thwart this attack.
     *
     * <p>The time taken to compute multiple quantiles on the same dataset using {@link Scale#indexes
     * indexes} is generally less than the total time taken to compute each of them separately, and
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri May 12 17:02:53 UTC 2023
    - 29.9K bytes
    - Viewed (0)
  10. cmd/generic-handlers.go

    				stack := debug.Stack()
    				logger.Error("critical: \"%s %s\": %v\n%s", r.Method, r.URL, rec, string(stack))
    				writeErrorResponse(r.Context(), w, errorCodes.ToAPIErr(ErrInternalError), r.URL)
    				return
    			} else if rec != nil {
    				stack := debug.Stack()
    				logger.Error("panic: \"%s %s\": %v\n%s", r.Method, r.URL, rec, string(stack))
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jul 29 18:10:04 UTC 2024
    - 20.5K bytes
    - Viewed (0)
Back to top