Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 11 - 20 of 245 for attacks (0.04 seconds)

  1. guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java

    import java.util.Collection;
    import java.util.Map;
    import org.jspecify.annotations.Nullable;
    
    /**
     * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect
     * against hash flooding attacks.
     *
     * @author Louis Wasserman
     */
    @GwtCompatible
    final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> {
      private final Map<E, Integer> delegateMap;
      private final ImmutableList<Entry<E>> entries;
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Tue Sep 23 17:50:58 GMT 2025
    - 3.2K bytes
    - Click Count (0)
  2. src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java

    import jcifs.internal.util.SMBUtil;
    
    /**
     * SMB2 Pre-authentication Integrity Negotiate Context.
     *
     * This negotiate context is used in SMB 3.1.1 to establish
     * pre-authentication integrity protection against downgrade attacks.
     *
     * @author mbechler
     */
    public class PreauthIntegrityNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse {
    
        /**
         * Context type
         */
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 4.4K bytes
    - Click Count (0)
  3. src/main/java/jcifs/util/InputValidator.java

     */
    package jcifs.util;
    
    import java.util.regex.Pattern;
    
    /**
     * Comprehensive input validation utility for SMB protocol implementation.
     * Provides validation methods to prevent buffer overflows, injection attacks,
     * and other security vulnerabilities.
     */
    public final class InputValidator {
    
        private InputValidator() {
            // Utility class
        }
    
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 13.5K bytes
    - Click Count (0)
  4. code_of_conduct.md

    Examples of unacceptable behavior by participants include:
    
    * The use of sexualized language or imagery and unwelcome sexual attention or
      advances
    * Trolling, insulting/derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or electronic
      address, without explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Mon Jan 20 18:38:58 GMT 2020
    - 3.5K bytes
    - Click Count (0)
  5. docs/de/docs/advanced/security/http-basic-auth.md

        # Einen Error zurückgeben
        ...
    ```
    
    Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden.
    
    ### Timing-Angriffe { #timing-attacks }
    
    Aber was ist ein „Timing-Angriff“?
    
    Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Sep 20 15:10:09 GMT 2025
    - 6.2K bytes
    - Click Count (0)
  6. docs/en/docs/advanced/middleware.md

    ## `TrustedHostMiddleware` { #trustedhostmiddleware }
    
    Enforces that all incoming requests have a correctly set `Host` header, in order to guard against HTTP Host Header attacks.
    
    {* ../../docs_src/advanced_middleware/tutorial002_py39.py hl[2,6:8] *}
    
    The following arguments are supported:
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 4.4K bytes
    - Click Count (0)
  7. CODE_OF_CONDUCT.md

    Examples of unacceptable behavior include:
    
    * The use of sexualized language or imagery, and sexual attention or
      advances of any kind
    * Trolling, insulting or derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or email
      address, without their explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Created: Sun Dec 28 09:35:17 GMT 2025
    - Last Modified: Thu Oct 17 06:18:13 GMT 2024
    - 5K bytes
    - Click Count (0)
  8. docs/contribute/code_of_conduct.md

       documentation may negatively impact others.
    
     * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions,
       and act with empathy. Do not turn disagreements into personal attacks.
    
     * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We
       strive for transparency within our open source community, and we work closely with upstream
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sun Feb 06 02:19:09 GMT 2022
    - 5.1K bytes
    - Click Count (0)
  9. src/main/java/jcifs/util/AuthenticationRateLimiter.java

    import java.util.concurrent.atomic.AtomicLong;
    
    import org.slf4j.Logger;
    import org.slf4j.LoggerFactory;
    
    import jcifs.smb.SmbException;
    
    /**
     * Rate limiter for authentication attempts to prevent brute force attacks.
     *
     * Features:
     * - Per-account rate limiting
     * - Per-IP rate limiting
     * - Global rate limiting
     * - Exponential backoff for repeated failures
     * - Account lockout after threshold
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 15.1K bytes
    - Click Count (0)
  10. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

            constantTimeCopy(output, message.length, authTag, 0, tagLength);
    
            return new EncryptionResult(ciphertext, authTag);
        }
    
        /**
         * Perform constant-time encryption to prevent timing attacks
         */
        private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception {
            // Pad to fixed block size to prevent timing leaks
            int blockSize = cipher.getBlockSize();
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 35.5K bytes
    - Click Count (0)
Back to Top