Search Options

Results per page
Sort
Preferred Languages
Advance

Results 131 - 140 of 151 for Attach (0.1 sec)

  1. okhttp/src/main/kotlin/okhttp3/HttpUrl.kt

     * "/static/images/" before serving the corresponding assets from the filesystem.
     *
     * ```java
     * String attack = "http://example.com/static/images/../../../../../etc/passwd";
     * System.out.println(new URL(attack).getPath());
     * System.out.println(new URI(attack).getPath());
     * System.out.println(HttpUrl.parse(attack).encodedPath());
     * ```
     *
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Tue Jan 09 12:33:05 UTC 2024
    - 63.5K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/RegularImmutableBiMap.java

      /**
       * @throws IllegalArgumentException if another entry in the bucket has the same key
       * @throws BucketOverflowException if this bucket has too many entries, which may indicate a hash
       *     flooding attack
       */
      private static void checkNoConflictInValueBucket(
          Object value, Entry<?, ?> entry, @CheckForNull ImmutableMapEntry<?, ?> valueBucketHead)
          throws BucketOverflowException {
        int bucketSize = 0;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  3. docs/pt/docs/advanced/security/http-basic-auth.md

        ...
    ```
    
    Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização).
    
    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    E eles enviam uma requisição com um usuário `johndoe` e uma senha `love123`.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  4. okhttp/src/test/java/okhttp3/internal/cache/DiskLruCacheTest.kt

        setUp(parameters.first, parameters.second)
        Assumptions.assumeFalse(windows) // Windows can't have two concurrent editors.
    
        // Create an editor for k1. Detach it by clearing the cache.
        val editor = cache.edit("k1")!!
        editor.setString(0, "a")
        editor.setString(1, "a")
        cache.evictAll()
    
        // Create a new value in its place.
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Apr 15 14:55:09 UTC 2024
    - 75.8K bytes
    - Viewed (0)
  5. docs/security/README.md

    #### Secure Erasure and Locking
    
    The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
  6. docs/en/docs/virtual-environments.md

    An **environment variable** is a variable in the system that can be used by programs.
    
    A **virtual environment** is a directory with some files in it.
    
    ///
    
    /// info
    
    This page will teach you how to use **virtual environments** and how they work.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Aug 24 03:16:23 UTC 2024
    - 21.7K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/CompactHashSet.java

          int expectedSize) {
        return new CompactHashSet<>(expectedSize);
      }
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting(
          )
      static final double HASH_FLOODING_FPP = 0.001;
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24K bytes
    - Viewed (0)
  8. src/main/webapp/js/admin/plugins/timepicker/bootstrap-timepicker.min.js

    is.second,meridian:this.meridian}}),"modal"===this.template&&this.$widget.modal?this.$widget.modal("hide"):this.$widget.removeClass("open"),a(c).off("mousedown.timepicker, touchend.timepicker",this.handleDocumentClick),this.isOpen=!1,this.$widget.detach())},highlightUnit:function(){this.position=this.getCursorPosition(),this.position>=0&&this.position<=2?this.highlightHour():this.position>=3&&this.position<=5?this.highlightMinute():this.position>=6&&this.position<=8?this.showSeconds?this.highlig...
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Thu Feb 13 04:21:06 UTC 2020
    - 18.2K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/CompactHashSet.java

          int expectedSize) {
        return new CompactHashSet<>(expectedSize);
      }
    
      /**
       * Maximum allowed false positive probability of detecting a hash flooding attack given random
       * input.
       */
      @VisibleForTesting(
          )
      static final double HASH_FLOODING_FPP = 0.001;
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24.9K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/math/Quantiles.java

     * passing in unsanitized user data then a malicious user could force it. A light shuffle of the
     * data using an unpredictable seed should normally be enough to thwart this attack.
     *
     * <p>The time taken to compute multiple quantiles on the same dataset using {@link Scale#indexes
     * indexes} is generally less than the total time taken to compute each of them separately, and
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri May 12 17:02:53 UTC 2023
    - 29.9K bytes
    - Viewed (0)
Back to top