Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 71 - 80 of 248 for attacker (0.06 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. CODE_OF_CONDUCT.md

    Examples of unacceptable behavior include:
    
    * The use of sexualized language or imagery, and sexual attention or
      advances of any kind
    * Trolling, insulting or derogatory comments, and personal or political attacks
    * Public or private harassment
    * Publishing others' private information, such as a physical or email
      address, without their explicit permission
    * Other conduct which could reasonably be considered inappropriate in a
    Created: Sun Dec 28 09:35:17 GMT 2025
    - Last Modified: Thu Oct 17 06:18:13 GMT 2024
    - 5K bytes
    - Click Count (0)
  2. CHANGELOG/CHANGELOG-1.2.md

      * If a node or kubelet crashes with a volume attached, the volume will remain
    attached to that node. If that volume can only be attached to one node at a
    time (GCE PDs attached in RW mode, for example), then the volume must be
    manually detached before Kubernetes can attach it to other nodes.
      * If a volume is already attached to a node any subsequent attempts to attach it
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Fri Dec 04 06:36:19 GMT 2020
    - 41.4K bytes
    - Click Count (0)
  3. docs/de/llm-prompt.md

    * «/// check»: «/// check | Testen»
    * «/// danger»: «/// danger | Gefahr»
    * «/// info»: «/// info | Info»
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Fri Dec 26 09:39:53 GMT 2025
    - 11.9K bytes
    - Click Count (0)
  4. docs/contribute/code_of_conduct.md

       documentation may negatively impact others.
    
     * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions,
       and act with empathy. Do not turn disagreements into personal attacks.
    
     * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We
       strive for transparency within our open source community, and we work closely with upstream
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sun Feb 06 02:19:09 GMT 2022
    - 5.1K bytes
    - Click Count (0)
  5. cmd/generic-handlers.go

    		header.Set("X-XSS-Protection", "1; mode=block")                                // Prevents against XSS attacks
    		header.Set("X-Content-Type-Options", "nosniff")                                // Prevent mime-sniff
    		header.Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains") // HSTS mitigates variants of MITM attacks
    
    		// Previously, this value was set right before a response was sent to
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 20.7K bytes
    - Click Count (1)
  6. LICENSES/vendor/github.com/containerd/errdefs/pkg/LICENSE

          "Work" shall mean the work of authorship, whether in Source or
          Object form, made available under the License, as indicated by a
          copyright notice that is included in or attached to the work
          (an example is provided in the Appendix below).
    
          "Derivative Works" shall mean any work, whether in Source or Object
          form, that is based on (or derived from) the Work and for which the
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Mar 05 11:36:39 GMT 2025
    - 10.7K bytes
    - Click Count (0)
  7. src/main/java/org/codelibs/fess/ds/DataStoreFactory.java

         * in the data store plugin directory and extracts component class names.
         *
         * <p>The method uses secure XML parsing features to prevent XXE attacks and
         * other XML-based vulnerabilities. Component class names are extracted from
         * the 'class' attribute of 'component' elements in the XML files.</p>
         *
    Created: Sat Dec 20 09:19:18 GMT 2025
    - Last Modified: Fri Nov 28 16:29:12 GMT 2025
    - 9K bytes
    - Click Count (0)
  8. README.md

    the concept of a project object model (POM), Maven can manage a project's
    build, reporting and documentation from a central piece of information.
    
    If you think you have found a bug, please file an issue in the [Maven Issue Tracker](https://github.com/apache/maven/issues).
    
    Documentation
    -------------
    
    More information can be found on [Apache Maven Homepage][maven-home].
    Questions related to the usage of Maven should be posted on
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Sun Nov 16 13:30:57 GMT 2025
    - 4.8K bytes
    - Click Count (0)
  9. src/main/java/jcifs/util/AuthenticationRateLimiter.java

    import java.util.concurrent.atomic.AtomicLong;
    
    import org.slf4j.Logger;
    import org.slf4j.LoggerFactory;
    
    import jcifs.smb.SmbException;
    
    /**
     * Rate limiter for authentication attempts to prevent brute force attacks.
     *
     * Features:
     * - Per-account rate limiting
     * - Per-IP rate limiting
     * - Global rate limiting
     * - Exponential backoff for repeated failures
     * - Account lockout after threshold
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 15.1K bytes
    - Click Count (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealRoutePlanner.kt

        val pooled2 = planReusePooledConnection(connect, connect.routes)
        if (pooled2 != null) return pooled2
    
        return connect
      }
    
      /**
       * Returns the connection already attached to the call if it's eligible for a new exchange.
       *
       * If the call's connection exists and is eligible for another exchange, it is returned. If it
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Oct 08 03:50:05 GMT 2025
    - 12K bytes
    - Click Count (0)
Back to Top