Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 155 for attacks (0.04 sec)

  1. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks { #timing-attacks }
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  3. docs/es/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks".
    
    ### Timing Attacks
    
    ¿Pero qué es un "timing attack"?
    
    Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.
    
    Y envían un request con un nombre de usuario `johndoe` y una contraseña `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  4. README.md

    - **Encryption Context**: Per-session encryption state management
    - **Key Derivation**: SMB3 KDF implementation with dialect-specific parameters
    - **Pre-Authentication Integrity**: SMB 3.1.1 PAI for preventing downgrade attacks
    - **Automatic Detection**: Encryption automatically enabled when servers require it
    - **Secure Key Management**: Proper key derivation and nonce generation
    
    ### Core Features
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 09:24:52 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  5. src/main/java/jcifs/ntlmssp/av/AvTimestamp.java

     */
    package jcifs.ntlmssp.av;
    
    import jcifs.internal.util.SMBUtil;
    
    /**
     * NTLMSSP AV pair representing timestamp information in NTLM authentication.
     * Contains time-based data used to prevent replay attacks and ensure message freshness.
     *
     * @author mbechler
     */
    public class AvTimestamp extends AvPair {
    
        /**
         * Constructs an AvTimestamp from raw byte data
         *
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 1.9K bytes
    - Viewed (0)
  6. guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java

    import java.util.Collection;
    import java.util.Map;
    import org.jspecify.annotations.Nullable;
    
    /**
     * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect
     * against hash flooding attacks.
     *
     * @author Louis Wasserman
     */
    @GwtCompatible
    final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> {
      private final Map<E, Integer> delegateMap;
      private final ImmutableList<Entry<E>> entries;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Apr 08 13:05:15 UTC 2025
    - 3.2K bytes
    - Viewed (0)
  7. src/main/java/jcifs/util/InputValidator.java

     */
    package jcifs.util;
    
    import java.util.regex.Pattern;
    
    /**
     * Comprehensive input validation utility for SMB protocol implementation.
     * Provides validation methods to prevent buffer overflows, injection attacks,
     * and other security vulnerabilities.
     */
    public final class InputValidator {
    
        private InputValidator() {
            // Utility class
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  8. src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java

    import jcifs.internal.util.SMBUtil;
    
    /**
     * SMB2 Pre-authentication Integrity Negotiate Context.
     *
     * This negotiate context is used in SMB 3.1.1 to establish
     * pre-authentication integrity protection against downgrade attacks.
     *
     * @author mbechler
     */
    public class PreauthIntegrityNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse {
    
        /**
         * Context type
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  9. docs/en/docs/advanced/middleware.md

    ## `TrustedHostMiddleware` { #trustedhostmiddleware }
    
    Enforces that all incoming requests have a correctly set `Host` header, in order to guard against HTTP Host Header attacks.
    
    {* ../../docs_src/advanced_middleware/tutorial002.py hl[2,6:8] *}
    
    The following arguments are supported:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:59:07 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  10. docs/pt/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização).
    
    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 5.1K bytes
    - Viewed (0)
Back to top