- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 96 for attaches (0.06 seconds)
-
android/guava/src/com/google/common/util/concurrent/MoreExecutors.java
* directExecutor}, the listener can execute in any of three possible threads: * <ol> * <li>When a thread attaches a listener to a {@code ListenableFuture} that's already * complete, the listener runs immediately in that thread. * <li>When a thread attaches a listener to a {@code ListenableFuture} that's * incomplete and the {@code ListenableFuture} later completes normally, the
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Jan 28 22:39:02 GMT 2026 - 45.6K bytes - Click Count (0) -
docs/fr/docs/advanced/security/http-basic-auth.md
# Renvoyer une erreur ... ``` Mais en utilisant `secrets.compare_digest()`, cela sera sécurisé contre un type d'attaques appelé « attaques par chronométrage ». ### Attaques par chronométrage { #timing-attacks } Mais qu'est-ce qu'une « attaque par chronométrage » ? Imaginons que des attaquants essaient de deviner le nom d'utilisateur et le mot de passe.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 5.8K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 5K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario. These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they: * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/tr/docs/advanced/security/http-basic-auth.md
# Bir hata döndür ... ``` Ancak `secrets.compare_digest()` kullanarak, "timing attacks" denilen bir saldırı türüne karşı güvenli olursunuz. ### Timing Attacks { #timing-attacks } Peki "timing attack" nedir? Bazı saldırganların kullanıcı adı ve şifreyi tahmin etmeye çalıştığını düşünelim.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/uk/docs/advanced/security/http-basic-auth.md
# Поверніть якусь помилку ... ``` Але використовуючи `secrets.compare_digest()`, це буде захищено від типу атак, що називаються «атаки за часом» (timing attacks). ### Атаки за часом { #timing-attacks } Що таке «атака за часом»? Уявімо, що зловмисники намагаються вгадати ім'я користувача та пароль. Вони надсилають запит з ім'ям користувача `johndoe` та паролем `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:27:41 GMT 2026 - 7.6K bytes - Click Count (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.3K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/internal/impl/DefaultProjectManager.java
requireNonNull(project, "project" + " cannot be null"); Collection<ProducedArtifact> attached = map(getMavenProject(project).getAttachedArtifacts(), a -> getSession(project) .getArtifact(ProducedArtifact.class, RepositoryUtils.toArtifact(a))); return Collections.unmodifiableCollection(attached); } @Override @Nonnull
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Dec 17 16:17:01 GMT 2025 - 10.9K bytes - Click Count (0) -
docs/ru/docs/advanced/security/http-basic-auth.md
#### Время ответа помогает злоумышленникам { #the-time-to-answer-helps-the-attackers } Замечая, что сервер прислал «Неверное имя пользователя или пароль» на несколько микросекунд позже, злоумышленники поймут, что какая-то часть была угадана — начальные буквы верны.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 7.4K bytes - Click Count (0) -
docs/ko/docs/advanced/security/http-basic-auth.md
```Python if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"): # 어떤 오류를 반환 ... ``` 하지만 `secrets.compare_digest()`를 사용하면 "timing attacks"라고 불리는 한 유형의 공격에 대해 안전해집니다. ### 타이밍 공격 { #timing-attacks } 그렇다면 "timing attack"이란 무엇일까요? 공격자들이 사용자명과 비밀번호를 추측하려고 한다고 가정해봅시다. 그리고 사용자명 `johndoe`, 비밀번호 `love123`으로 요청을 보냅니다. 그러면 애플리케이션의 Python 코드는 대략 다음과 같을 것입니다: ```Python
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 5.9K bytes - Click Count (0)