- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 217 for attacker (0.05 sec)
-
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
fun signersMustHaveCaBitSet() { val attackerCa = HeldCertificate .Builder() .serialNumber(1L) .certificateAuthority(4) .commonName("attacker ca") .build() val attackerIntermediate = HeldCertificate .Builder() .serialNumber(2L) .certificateAuthority(3) .commonName("attacker") .signedBy(attackerCa)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
SECURITY.md
### Hardware attacks Physical GPUs or TPUs can also be the target of attacks. [Published research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
src/archive/tar/reader.go
if err != nil || numEntries < 0 || int(2*numEntries) < int(numEntries) { return nil, ErrHeader } // Parse for all member entries. // numEntries is trusted after this since a potential attacker must have // committed resources proportional to what this library used. if err := feedTokens(2 * numEntries); err != nil { return nil, err } spd := make(sparseDatas, 0, numEntries)
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Mar 08 01:59:14 UTC 2024 - 26.8K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/services/ProjectManager.java
@Nonnull Optional<Path> getPath(@Nonnull Project project); /** * Returns an immutable collection of attached artifacts for the given project. * Attached artifacts are secondary artifacts produced during the build (e.g., sources jar, * javadoc jar, test jars). These artifacts are created and attached during specific * lifecycle phases, so the collection contents depend on the build phase when this method * is called.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Thu Jan 30 23:29:13 UTC 2025 - 12K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Request.kt
fun headers(name: String): List<String> = headers.values(name) /** Returns the tag attached with [T] as a key, or null if no tag is attached with that key. */ @JvmName("reifiedTag") inline fun <reified T : Any> tag(): T? = tag(T::class) /** Returns the tag attached with [type] as a key, or null if no tag is attached with that key. */ fun <T : Any> tag(type: KClass<T>): T? = type.java.cast(tags[type]) /**
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Aug 16 09:39:51 UTC 2025 - 13.1K bytes - Viewed (1) -
.github/ISSUE_TEMPLATE/10_contributor_bug_report.yml
Registered: Wed Sep 10 11:36:15 UTC 2025 - Last Modified: Mon Sep 09 14:48:49 UTC 2024 - 3K bytes - Viewed (1) -
docs/es/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing Attacks ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña. Y envían un request con un nombre de usuario `johndoe` y una contraseña `love123`.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 5.1K bytes - Viewed (0) -
docs/features/https.md
By default, OkHttp trusts the certificate authorities of the host platform. This strategy maximizes connectivity, but it is subject to certificate authority attacks such as the [2011 DigiNotar attack](https://www.computerworld.com/article/2510951/cybercrime-hacking/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html). It also assumes your HTTPS servers’ certificates are signed by a certificate authority.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Dec 24 00:16:30 UTC 2022 - 10.5K bytes - Viewed (0) -
cmd/global-heal.go
return errServerNotInitialized } started := tracker.Started if started.IsZero() || started.Equal(timeSentinel) { healingLogIf(ctx, fmt.Errorf("unexpected tracker healing start time found: %v", started)) started = time.Time{} } // Final tracer update before quitting defer func() { tracker.setObject("") tracker.setBucket("") healingLogIf(ctx, tracker.update(ctx)) }()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 04 13:49:12 UTC 2025 - 16.2K bytes - Viewed (0)