Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 21 - 30 of 285 for attaches (0.05 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. docs/en/docs/advanced/strict-content-type.md

    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  2. docs/multi-user/admin/README.md

    ### 3. Configure `mc` and create another user user1 with attached policy user1policy
    
    ```
    mc alias set myminio-admin1 http://localhost:9000 admin1 admin123 --api s3v4
    
    mc admin user add myminio-admin1 user1 user123
    mc admin policy attach myminio-admin1 user1policy ~/user1policy.json
    mc admin policy attach myminio-admin1 user1policy --user=user1
    ```
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 4.7K bytes
    - Click Count (0)
  3. helm/minio/templates/_helper_create_user.txt

      if [ ! -z $POLICY -a $POLICY != " " ] ; then
          echo "Adding policy '$POLICY' for '$USER'"
          set +e ; # policy already attach errors out, allow it.
          ${MC} admin policy attach myminio $POLICY --user=$USER
          set -e
      else
          echo "User '$USER' has no policy attached."
      fi
    }
    
    # Try connecting to MinIO instance
    {{- if .Values.tls.enabled }}
    scheme=https
    {{- else }}
    scheme=http
    {{- end }}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Dec 12 23:43:32 GMT 2023
    - 3.2K bytes
    - Click Count (0)
  4. docs/tr/docs/advanced/security/http-basic-auth.md

        # Bir hata döndür
        ...
    ```
    
    Ancak `secrets.compare_digest()` kullanarak, "timing attacks" denilen bir saldırı türüne karşı güvenli olursunuz.
    
    ### Timing Attacks { #timing-attacks }
    
    Peki "timing attack" nedir?
    
    Bazı saldırganların kullanıcı adı ve şifreyi tahmin etmeye çalıştığını düşünelim.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  5. docs/uk/docs/advanced/security/http-basic-auth.md

        # Поверніть якусь помилку
        ...
    ```
    
    Але використовуючи `secrets.compare_digest()`, це буде захищено від типу атак, що називаються «атаки за часом» (timing attacks).
    
    ### Атаки за часом { #timing-attacks }
    
    Що таке «атака за часом»?
    
    Уявімо, що зловмисники намагаються вгадати ім'я користувача та пароль.
    
    Вони надсилають запит з ім'ям користувача `johndoe` та паролем `love123`.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:27:41 GMT 2026
    - 7.6K bytes
    - Click Count (0)
  6. docs/es/docs/advanced/security/http-basic-auth.md

        # Devuelve algún error
        ...
    ```
    
    Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks".
    
    ### Timing attacks { #timing-attacks }
    
    ¿Pero qué es un "timing attack"?
    
    Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:15:55 GMT 2026
    - 5.3K bytes
    - Click Count (0)
  7. docs/multi-user/README.md

    ```
    mc admin policy attach myminio getonly --user=newuser
    ```
    
    ### 3. Create a new group
    
    ```
    mc admin group add myminio newgroup newuser
    ```
    
    Once the group is successfully created you can now apply the `getonly` policy for this group.
    
    ```
    mc admin policy attach myminio getonly --group=newgroup
    ```
    
    ### 4. Disable user
    
    Disable user `newuser`.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 8.2K bytes
    - Click Count (0)
  8. impl/maven-core/src/main/java/org/apache/maven/internal/impl/DefaultProjectManager.java

            requireNonNull(project, "project" + " cannot be null");
            Collection<ProducedArtifact> attached =
                    map(getMavenProject(project).getAttachedArtifacts(), a -> getSession(project)
                            .getArtifact(ProducedArtifact.class, RepositoryUtils.toArtifact(a)));
            return Collections.unmodifiableCollection(attached);
        }
    
        @Override
        @Nonnull
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Dec 17 16:17:01 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  9. docs/ru/docs/advanced/security/http-basic-auth.md

    #### Время ответа помогает злоумышленникам { #the-time-to-answer-helps-the-attackers }
    
    Замечая, что сервер прислал «Неверное имя пользователя или пароль» на несколько микросекунд позже, злоумышленники поймут, что какая-то часть была угадана — начальные буквы верны.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 7.4K bytes
    - Click Count (0)
  10. docs/ko/docs/advanced/security/http-basic-auth.md

    ```Python
    if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"):
        # 어떤 오류를 반환
        ...
    ```
    
    하지만 `secrets.compare_digest()`를 사용하면 "timing attacks"라고 불리는 한 유형의 공격에 대해 안전해집니다.
    
    ### 타이밍 공격 { #timing-attacks }
    
    그렇다면 "timing attack"이란 무엇일까요?
    
    공격자들이 사용자명과 비밀번호를 추측하려고 한다고 가정해봅시다.
    
    그리고 사용자명 `johndoe`, 비밀번호 `love123`으로 요청을 보냅니다.
    
    그러면 애플리케이션의 Python 코드는 대략 다음과 같을 것입니다:
    
    ```Python
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 14:06:26 GMT 2026
    - 5.9K bytes
    - Click Count (0)
Back to Top