Searched refs:abuse (Results 1 – 25 of 47) sorted by relevance
12
29 def abuse(self, a, b, c): member in StupidGit
156 git.abuse(7, 8, 9)264 self.assertEqual(inspect.getdoc(git.abuse),281 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)283 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)290 self.assertSourceEqual(git.abuse, 29, 39)295 self.assertEqual(inspect.getsourcefile(git.abuse), modfile)
51 An attacker can abuse vulnerabilities for e.g. denial of service attacks, to53 to or circumvent firewalls. The attacks on XML abuse unfamiliar features
2 ; We abuse sign extension of vectors of i1 because that's the only way to force
57 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
163 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
8 odd corner cases, regression tests, and abject abuse and misuse.
81 Bug reports, feedback, admiration, abuse, etc, to: njn\@valgrind.org.
59 <P>See the <A href="http://www.abuse.net/">Network Abuse
388 As of gnu-efi-3.0, we make use (and somewhat abuse) the gcc option391 size. By abuse, we mean that we rely on the fact that the regular ASCII
150 attacker may abuse a running ssh client to surreptitiously open
841 the potential for abuse, this file must have strict permissions:
1072 Because of the potential for abuse, this file must have strict
376 such invocations, and overall there isn't a good reason to abuse
48 abstracts)!I8KLJICLKabuse0'8B!NQabuse)'8B!NKabused M'8B!NQ9abuses
54 pattern of such abuse occurs in the area of products for individuals to
736 considered an abuse of goto anyway. Use sparingly.
966 programs should not abuse this freedom, as future implementations may enforce
61 systematic pattern of such abuse occurs in the area of products for