Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 1,249 for attack (0.13 sec)

  1. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

          HeldCertificate.Builder()
            .serialNumber(1L)
            .certificateAuthority(4)
            .commonName("attacker ca")
            .build()
        val attackerIntermediate =
          HeldCertificate.Builder()
            .serialNumber(2L)
            .certificateAuthority(3)
            .commonName("attacker")
            .signedBy(attackerCa)
            .build()
        val pinnedRoot =
          HeldCertificate.Builder()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/RegularImmutableMap.java

       * saving space.
       */
      @VisibleForTesting static final double MAX_LOAD_FACTOR = 1.2;
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting static final double HASH_FLOODING_FPP = 0.001;
    
      /**
       * Maximum allowed length of a hash table bucket before falling back to a j.u.HashMap based
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 28 18:11:09 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:01:27 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  4. SECURITY.md

    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. docs/features/https.md

    By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Dec 24 00:16:30 UTC 2022
    - 10.5K bytes
    - Viewed (0)
  6. src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java

            br.addElement("Against for CVE-2014-0050 (JVN14876762).");
            br.addElement("Boundary size is limited by Framework.");
            br.addElement("Too long boundary is treated as 404 because it's thought of as attack.");
            br.addElement("");
            br.addElement("While, you can override the boundary limit size");
            br.addElement(" in " + getClass().getSimpleName() + ".");
            br.addItem("Content Type");
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Oct 23 13:27:21 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  7. docs/pt/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização).
    
    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/RegularImmutableBiMap.java

      /**
       * @throws IllegalArgumentException if another entry in the bucket has the same key
       * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash
       *     flooding attack
       */
      private static void checkNoConflictInValueBucket(
          Object value, Entry<?, ?> entry, @CheckForNull ImmutableMapEntry<?, ?> valueBucketHead)
          throws BucketOverflowException {
        int bucketSize = 0;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  9. okhttp/src/main/kotlin/okhttp3/HttpUrl.kt

     *
     * ```java
     * String attack = "http://example.com/static/images/../../../../../etc/passwd";
     * System.out.println(new URL(attack).getPath());
     * System.out.println(new URI(attack).getPath());
     * System.out.println(HttpUrl.parse(attack).encodedPath());
     * ```
     *
     * By canonicalizing the input paths, they are complicit in directory traversal attacks. Code that
     * checks only the path prefix may suffer!
     *
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Tue Jan 09 12:33:05 UTC 2024
    - 63.5K bytes
    - Viewed (0)
  10. docs/security/README.md

    #### Secure Erasure and Locking
    
    The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
Back to top