Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 22 for compromised (0.11 sec)

  1. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

          HeldCertificate.Builder()
            .serialNumber(3L)
            .certificateAuthority(0)
            .commonName("compromised intermediate")
            .signedBy(pinnedRoot)
            .build()
        val attackerIntermediate =
          HeldCertificate.Builder()
            .keyPair(attackerCa.keyPair) // Share keys between compromised CA and intermediate!
            .serialNumber(4L)
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
  2. docs/security/README.md

    #### Key rotation
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 13.8K bytes
    - Viewed (0)
  3. mvnw.cmd

           "$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^
           "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^
           "  Write-Error 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^
           "  Write-Error 'Investigate or delete %WRAPPER_JAR% to attempt a clean download.';"^
           "  Write-Error 'If you updated your Maven version, you need to update the specified wrapperSha256Sum property.';"^
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 14 22:24:15 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  4. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

         * Most TLS clients that connect to hosts on the public Internet should call this method.
         * Otherwise it is necessary to manually prepare a comprehensive set of trusted roots.
         *
         * If the host platform is compromised or misconfigured this may contain untrustworthy root
         * certificates. Applications that connect to a known set of servers may be able to mitigate
         * this problem with [certificate pinning][CertificatePinner].
         */
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  5. mvnw

        exit 1
      fi
      if [ $wrapperSha256Result = false ]; then
        echo "Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised." >&2
        echo "Investigate or delete $wrapperJarPath to attempt a clean download." >&2
        echo "If you updated your Maven version, you need to update the specified wrapperSha256Sum property." >&2
        exit 1
      fi
    fi
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 14 22:24:15 UTC 2024
    - 10.9K bytes
    - Viewed (0)
  6. architecture/ambient/ztunnel.md

    Critically, the CA must enforce that the ztunnel has permission to request that identity.
    Requests for identities not running on the node are rejected.
    This is critical to ensure that a compromised node does not compromise the entire mesh.
    
    This CA enforcement is done by Istio's CA, and is a requirement for any alternative CAs integrating with Ztunnel.
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  7. cmd/encryption-v1.go

    	errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS")
    	// Additional MinIO errors for SSE-C requests.
    	errObjectTampered = errors.New("The requested object was modified and may be compromised")
    	// error returned when invalid encryption parameters are specified
    	errInvalidEncryptionParameters     = errors.New("The encryption parameters are not applicable to this object")
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  8. docs/nl/docs/features.md

    * **Automatische validatie** zelfs voor *padoperatie* parameters gedefinieerd in dependencies.
    * Ondersteuning voor complexe gebruikersauthenticatiesystemen, **databaseverbindingen**, enz.
    * **Geen compromisen** met databases, gebruikersinterfaces, enz. Maar eenvoudige integratie met ze allemaal.
    
    ### Ongelimiteerde "plug-ins"
    
    Of anders gezegd, je hebt ze niet nodig, importeer en gebruik de code die je nodig hebt.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Sep 03 13:50:38 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/oauth2-jwt.md

    Many packages that simplify it a lot have to make many compromises with the data model, database, and available features. And some of these packages that simplify things too much actually have security flaws underneath.
    
    ---
    
    **FastAPI** doesn't make any compromise with any database, data model or tool.
    
    It gives you all the flexibility to choose the ones that fit your project the best.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.17.md

    ## Changelog since v1.17.8
    
    ## Urgent Upgrade Notes
    
    ### (No, really, you MUST read this before you upgrade)
    
     - CVE-2020-8559 (Medium): Privilege escalation from compromised node to cluster. See https://github.com/kubernetes/kubernetes/issues/92914 for more details.
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Jan 28 10:44:33 UTC 2021
    - 346.2K bytes
    - Viewed (1)
Back to top