- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 245 for attacks (0.04 seconds)
-
guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java
import java.util.Collection; import java.util.Map; import org.jspecify.annotations.Nullable; /** * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect * against hash flooding attacks. * * @author Louis Wasserman */ @GwtCompatible final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> { private final Map<E, Integer> delegateMap; private final ImmutableList<Entry<E>> entries;
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 23 17:50:58 GMT 2025 - 3.2K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java
import jcifs.internal.util.SMBUtil; /** * SMB2 Pre-authentication Integrity Negotiate Context. * * This negotiate context is used in SMB 3.1.1 to establish * pre-authentication integrity protection against downgrade attacks. * * @author mbechler */ public class PreauthIntegrityNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse { /** * Context type */Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 4.4K bytes - Click Count (0) -
src/main/java/jcifs/util/InputValidator.java
*/ package jcifs.util; import java.util.regex.Pattern; /** * Comprehensive input validation utility for SMB protocol implementation. * Provides validation methods to prevent buffer overflows, injection attacks, * and other security vulnerabilities. */ public final class InputValidator { private InputValidator() { // Utility class }Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 13.5K bytes - Click Count (0) -
code_of_conduct.md
Examples of unacceptable behavior by participants include: * The use of sexualized language or imagery and unwelcome sexual attention or advances * Trolling, insulting/derogatory comments, and personal or political attacks * Public or private harassment * Publishing others' private information, such as a physical or electronic address, without explicit permission * Other conduct which could reasonably be considered inappropriate in a
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jan 20 18:38:58 GMT 2020 - 3.5K bytes - Click Count (0) -
docs/de/docs/advanced/security/http-basic-auth.md
# Einen Error zurückgeben ... ``` Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden. ### Timing-Angriffe { #timing-attacks } Aber was ist ein „Timing-Angriff“? Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Sep 20 15:10:09 GMT 2025 - 6.2K bytes - Click Count (0) -
docs/en/docs/advanced/middleware.md
## `TrustedHostMiddleware` { #trustedhostmiddleware } Enforces that all incoming requests have a correctly set `Host` header, in order to guard against HTTP Host Header attacks. {* ../../docs_src/advanced_middleware/tutorial002_py39.py hl[2,6:8] *} The following arguments are supported:Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.4K bytes - Click Count (0) -
CODE_OF_CONDUCT.md
Examples of unacceptable behavior include: * The use of sexualized language or imagery, and sexual attention or advances of any kind * Trolling, insulting or derogatory comments, and personal or political attacks * Public or private harassment * Publishing others' private information, such as a physical or email address, without their explicit permission * Other conduct which could reasonably be considered inappropriate in a
Created: Sun Dec 28 09:35:17 GMT 2025 - Last Modified: Thu Oct 17 06:18:13 GMT 2024 - 5K bytes - Click Count (0) -
docs/contribute/code_of_conduct.md
documentation may negatively impact others. * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions, and act with empathy. Do not turn disagreements into personal attacks. * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We strive for transparency within our open source community, and we work closely with upstream
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 5.1K bytes - Click Count (0) -
src/main/java/jcifs/util/AuthenticationRateLimiter.java
import java.util.concurrent.atomic.AtomicLong; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import jcifs.smb.SmbException; /** * Rate limiter for authentication attempts to prevent brute force attacks. * * Features: * - Per-account rate limiting * - Per-IP rate limiting * - Global rate limiting * - Exponential backoff for repeated failures * - Account lockout after threshold
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 15.1K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
constantTimeCopy(output, message.length, authTag, 0, tagLength); return new EncryptionResult(ciphertext, authTag); } /** * Perform constant-time encryption to prevent timing attacks */ private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception { // Pad to fixed block size to prevent timing leaks int blockSize = cipher.getBlockSize();
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 35.5K bytes - Click Count (0)