Searched refs:abuse (Results 1 – 25 of 40) sorted by relevance
12
29 def abuse(self, a, b, c): member in StupidGit55 def abuse(self, a, b, c): member in MalodorousPervert68 def abuse(self, a, b, c): member in FesteringGob
286 git.abuse(7, 8, 9)405 self.assertEqual(inspect.getdoc(git.abuse),413 self.assertEqual(inspect.getdoc(mod.FesteringGob.abuse),415 self.assertEqual(inspect.getdoc(mod.FesteringGob().abuse),448 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)450 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)462 self.assertSourceEqual(git.abuse, 29, 39)468 self.assertEqual(normcase(inspect.getsourcefile(git.abuse)), modfile)
527 # both users and should have the sticky bit set on it to prevent abuse.
29 def abuse(self, a, b, c): member in StupidGit
157 git.abuse(7, 8, 9)265 self.assertEqual(inspect.getdoc(git.abuse),282 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)284 self.assertEqual(inspect.getmodule(mod.StupidGit.abuse), mod)291 self.assertSourceEqual(git.abuse, 29, 39)296 self.assertEqual(inspect.getsourcefile(git.abuse), modfile)
51 An attacker can abuse vulnerabilities for e.g. denial of service attacks, to53 to or circumvent firewalls. The attacks on XML abuse unfamiliar features
2 ; We abuse sign extension of vectors of i1 because that's the only way to force
8 odd corner cases, regression tests, and abject abuse and misuse.
65 operating system where there has been extensive abuse of the
56 An attacker can abuse XML features to carry out denial of service attacks,
59 <P>See the <A href="http://www.abuse.net/">Network Abuse
376 such invocations, and overall there isn't a good reason to abuse
150 attacker may abuse a running ssh client to surreptitiously open
841 the potential for abuse, this file must have strict permissions:
247 "1000 anarchism originated as a term of abuse first used against earl\n"
54 pattern of such abuse occurs in the area of products for individuals to
703 considered an abuse of goto anyway. Use sparingly.
668 considered an abuse of goto anyway. Use sparingly.
954 programs should not abuse this freedom, as future implementations may enforce
966 programs should not abuse this freedom, as future implementations may enforce