Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 558 for attack (0.07 sec)

  1. guava/src/com/google/common/collect/RegularImmutableMap.java

       * saving space.
       */
      @VisibleForTesting static final double MAX_LOAD_FACTOR = 1.2;
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting static final double HASH_FLOODING_FPP = 0.001;
    
      /**
       * Maximum allowed length of a hash table bucket before falling back to a j.u.HashMap based
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 28 18:11:09 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:01:27 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  3. SECURITY.md

    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java

            br.addElement("Against for CVE-2014-0050 (JVN14876762).");
            br.addElement("Boundary size is limited by Framework.");
            br.addElement("Too long boundary is treated as 404 because it's thought of as attack.");
            br.addElement("");
            br.addElement("While, you can override the boundary limit size");
            br.addElement(" in " + getClass().getSimpleName() + ".");
            br.addItem("Content Type");
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Oct 23 13:27:21 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  5. docs/pt/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização).
    
    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  6. guava/src/com/google/common/collect/RegularImmutableBiMap.java

      /**
       * @throws IllegalArgumentException if another entry in the bucket has the same key
       * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash
       *     flooding attack
       */
      private static void checkNoConflictInValueBucket(
          Object value, Entry<?, ?> entry, @CheckForNull ImmutableMapEntry<?, ?> valueBucketHead)
          throws BucketOverflowException {
        int bucketSize = 0;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/CompactHashSet.java

      @VisibleForTesting @CheckForNull transient @Nullable Object[] elements;
    
      /**
       * Keeps track of metadata like the number of hash table bits and modifications of this data
       * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note
       * that we choose not to make this volatile, so we do less of a "best effort" to track such
       * errors, for better performance.
       */
      private transient int metadata;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/CompactHashSet.java

      @VisibleForTesting @CheckForNull transient @Nullable Object[] elements;
    
      /**
       * Keeps track of metadata like the number of hash table bits and modifications of this data
       * structure (to make it possible to throw ConcurrentModificationException in the iterator). Note
       * that we choose not to make this volatile, so we do less of a "best effort" to track such
       * errors, for better performance.
       */
      private transient int metadata;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24.9K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.31.md

    - Added a feature to report an event about a Pod if kubelet observes a failed attach operation, even if the kubelet is running with `--enable-controller-attach-detach=false`. ([#124884](https://github.com/kubernetes/kubernetes/pull/124884), [@carlory](https://github.com/carlory))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 12:18:32 UTC 2024
    - 315.4K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.29.md

    - Registered metric `apiserver_request_body_size_bytes` to track the size distribution of requests by `resource` and `verb`. ([#120474](https://github.com/kubernetes/kubernetes/pull/120474), [@YaoC](http...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:37:31 UTC 2024
    - 375.1K bytes
    - Viewed (1)
Back to top