Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 221 for attacks (0.04 sec)

  1. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks { #timing-attacks }
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  3. docs/es/docs/advanced/security/http-basic-auth.md

        # Return some error
        ...
    ```
    
    Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks".
    
    ### Timing Attacks
    
    ¿Pero qué es un "timing attack"?
    
    Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.
    
    Y envían un request con un nombre de usuario `johndoe` y una contraseña `love123`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  4. docs/sts/web-identity.py

        return text % make_authorization_url()
    
    
    def make_authorization_url():
        # Generate a random string for the state parameter
        # Save it for use later to prevent xsrf attacks
    
        state = str(uuid4())
        params = {"client_id": client_id,
                  "response_type": "code",
                  "state": state,
                  "redirect_uri": callback_uri,
                  "scope": "openid"}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Jul 28 01:37:51 UTC 2021
    - 2.9K bytes
    - Viewed (0)
  5. README.md

    - **Encryption Context**: Per-session encryption state management
    - **Key Derivation**: SMB3 KDF implementation with dialect-specific parameters
    - **Pre-Authentication Integrity**: SMB 3.1.1 PAI for preventing downgrade attacks
    - **Automatic Detection**: Encryption automatically enabled when servers require it
    - **Secure Key Management**: Proper key derivation and nonce generation
    
    ### Core Features
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 09:24:52 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  6. src/main/java/jcifs/ntlmssp/av/AvTimestamp.java

     */
    package jcifs.ntlmssp.av;
    
    import jcifs.internal.util.SMBUtil;
    
    /**
     * NTLMSSP AV pair representing timestamp information in NTLM authentication.
     * Contains time-based data used to prevent replay attacks and ensure message freshness.
     *
     * @author mbechler
     */
    public class AvTimestamp extends AvPair {
    
        /**
         * Constructs an AvTimestamp from raw byte data
         *
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 1.9K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java

    import java.util.Collection;
    import java.util.Map;
    import org.jspecify.annotations.Nullable;
    
    /**
     * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect
     * against hash flooding attacks.
     *
     * @author Louis Wasserman
     */
    @GwtCompatible
    final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> {
      private final Map<E, Integer> delegateMap;
      private final ImmutableList<Entry<E>> entries;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Apr 08 13:05:15 UTC 2025
    - 3.2K bytes
    - Viewed (0)
  8. src/main/java/jcifs/util/InputValidator.java

     */
    package jcifs.util;
    
    import java.util.regex.Pattern;
    
    /**
     * Comprehensive input validation utility for SMB protocol implementation.
     * Provides validation methods to prevent buffer overflows, injection attacks,
     * and other security vulnerabilities.
     */
    public final class InputValidator {
    
        private InputValidator() {
            // Utility class
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  9. src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java

    import jcifs.internal.util.SMBUtil;
    
    /**
     * SMB2 Pre-authentication Integrity Negotiate Context.
     *
     * This negotiate context is used in SMB 3.1.1 to establish
     * pre-authentication integrity protection against downgrade attacks.
     *
     * @author mbechler
     */
    public class PreauthIntegrityNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse {
    
        /**
         * Context type
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  10. code_of_conduct.md

    Examples of unacceptable behavior by participants include:
    
    * The use of sexualized language or imagery and unwelcome sexual attention or
      advances
    * Trolling, insulting/derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or electronic
      address, without explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Jan 20 18:38:58 UTC 2020
    - 3.5K bytes
    - Viewed (0)
Back to top