/dports/games/py-pychess/pychess-1.0.2/learn/puzzles/ |
H A D | baird.olv | 2772 "1.Rd4-e4 ! threat: 4674 "1.Rf4-e4 ! threat: 6862 "1.Kb6-a6 ! threat: 13777 "1.h3-h4 ! threat: 14857 "1.d3-d4 ! threat: 15461 "1.a3-a4 ! threat: 18140 "1.d5-d6 ! threat: 20507 "1.e5-e6 ! threat: 21097 "1.f3-f4 ! threat: 22401 "1.e2-e3 ! threat: [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/safe_browsing/core/proto/ |
H A D | realtimeapi.proto | 65 // Contains threat information including threat type, verdict type, cache 68 // Type of threat detected. 74 // Social engineering threat type for internal use. 76 // Unwanted software threat type. 78 // Unclear Billing threat type
|
/dports/games/lordsawar/lordsawar-0.3.2/src/ |
H A D | AI_Allocation.h | 83 int allocateStacksToThreat(Threat *threat); 89 int allocateStackToCapacityBuilding(Threat *threat, City *first_city, bool take_neutrals); 115 Stack *findBestAttackerFor(Threat *threat, guint32 &num_city_defenders);
|
H A D | AICityInfo.cpp | 40 void AICityInfo::addThreat(float dangerFromThisThreat, Threat *threat) in addThreat() argument 43 this->d_threats->push_back(threat); in addThreat()
|
/dports/lang/spidermonkey78/firefox-78.9.0/toolkit/components/url-classifier/ |
H A D | nsIUrlClassifierUtils.idl | 24 * Since the server responded with a threat type, multiple 90 * Convert threat type to list name. 92 * @param Integer to indicate threat type. 100 * Convert list name to threat type. 104 * @returns The threat type in integer. 139 * @param aChannel channel which encountered the threat.
|
/dports/lang/spidermonkey60/firefox-60.9.0/toolkit/components/url-classifier/ |
H A D | nsIUrlClassifierUtils.idl | 24 * Since the server responded with a threat type, multiple 90 * Convert threat type to list name. 92 * @param Integer to indicate threat type. 100 * Convert list name to threat type. 104 * @returns The threat type in integer. 141 * @param aChannel channel which encountered the threat.
|
/dports/www/firefox/firefox-99.0/toolkit/components/url-classifier/ |
H A D | nsIUrlClassifierUtils.idl | 24 * Since the server responded with a threat type, multiple 90 * Convert threat type to list name. 92 * @param Integer to indicate threat type. 100 * Convert list name to threat type. 104 * @returns The threat type in integer. 139 * @param aChannel channel which encountered the threat.
|
/dports/mail/thunderbird/thunderbird-91.8.0/toolkit/components/url-classifier/ |
H A D | nsIUrlClassifierUtils.idl | 24 * Since the server responded with a threat type, multiple 90 * Convert threat type to list name. 92 * @param Integer to indicate threat type. 100 * Convert list name to threat type. 104 * @returns The threat type in integer. 139 * @param aChannel channel which encountered the threat.
|
/dports/www/firefox-esr/firefox-91.8.0/toolkit/components/url-classifier/ |
H A D | nsIUrlClassifierUtils.idl | 24 * Since the server responded with a threat type, multiple 90 * Convert threat type to list name. 92 * @param Integer to indicate threat type. 100 * Convert list name to threat type. 104 * @returns The threat type in integer. 139 * @param aChannel channel which encountered the threat.
|
/dports/security/py-python-gvm/python-gvm-21.10.0/tests/protocols/gmpv208/entities/notes/ |
H A D | test_create_note.py | 146 self.gmp.create_note('foo', nvt_oid='oid1', threat=SeverityLevel.HIGH) 158 self.gmp.create_note('foo', nvt_oid='oid1', threat='') 161 self.gmp.create_note('foo', nvt_oid='oid1', threat='foo')
|
H A D | test_modify_note.py | 170 note_id='n1', text='foo', threat=SeverityLevel.HIGH 182 self.gmp.modify_note(note_id='n1', text='foo', threat='') 185 self.gmp.modify_note(note_id='n1', text='foo', threat='foo')
|
/dports/textproc/kibana7/kibana-7.16.2-darwin-x86_64/x-pack/plugins/security_solution/server/lib/detection_engine/scripts/rules/test_cases/imports/ |
H A D | multiple_ruleid_queries_corrupted.ndjson | 1 …:"high","updated_by":"elastic_kibana","tags":[],"to":"now","type":"query","threat":[],"version":1}, 2 …y":"low","updated_by":"elastic_kibana","tags":[],"to":"now","type":"query","threat":[],"version":1} 3 …y":"low","updated_by":"elastic_kibana","tags":[],"to":"now","type":"query","threat":[],"version":1}
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/android_webview/browser/safe_browsing/ |
H A D | README.md | 105 ## Supporting new threat types 107 As Chrome supports more threat types, so can WebView. The steps are: 109 1. Create quiet interstitial resources for the new threat type ([example 116 1. Add the new threat type to our list of threats ([example 122 1. Add a new threat type constant to the Android SDK (constants are defined in 125 before this step). The new threat type constant should only be used when the
|
/dports/security/fwbuilder/fwbuilder-5.3.7/src/unit_tests/PIXImporterTest/test_data/ |
H A D | asa8.3.test | 101 threat-detection basic-threat 102 threat-detection statistics access-list 103 no threat-detection statistics tcp-intercept
|
/dports/games/flightgear-aircraft/fgaircraft/f16/Nasal/ |
H A D | rwr.nas | 251 me.threat = me.contact[1];#print(me.threat); 253 if (me.threat > 0.5 and me.typ != me.AIRCRAFT_UNKNOWN and me.typ != me.AIRCRAFT_AI) { 254 me.threat = me.inner_radius;# inner circle 255 } elsif (me.threat > 0) { 256 me.threat = me.outer_radius;# outer circle 261 me.x = math.cos(me.dev*D2R)*me.threat; 262 me.y = -math.sin(me.dev*D2R)*me.threat; 301 #printf("display %s %d",contact[0].get_Callsign(), me.threat);
|
/dports/security/py-python-gvm/python-gvm-21.10.0/tests/protocols/gmpv208/entities/overrides/ |
H A D | test_create_override.py | 180 'foo', nvt_oid='oid1', threat=SeverityLevel.HIGH 193 self.gmp.create_override('foo', nvt_oid='oid1', threat='') 196 self.gmp.create_override('foo', nvt_oid='oid1', threat='foo')
|
H A D | test_modify_override.py | 208 override_id='o1', text='foo', threat=SeverityLevel.HIGH 220 self.gmp.modify_override(override_id='o1', text='foo', threat='') 223 self.gmp.modify_override(override_id='o1', text='foo', threat='foo')
|
/dports/www/ikiwiki/ikiwiki-3.20200202.3/doc/todo/ |
H A D | http_bl_support.mdwn | 36 my(undef, $days, $threat, $type) = split /\./, $answer; 43 threat => $threat,
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/.gitlab/ |
H A D | CODEOWNERS | 226 …tps://about.gitlab.com/handbook/engineering/development/threat-management/delineate-secure-threat-… 228 /app/finders/security/ @gitlab-org/secure/threat-insights-backend-team 229 /app/models/vulnerability.rb @gitlab-org/secure/threat-insights-backend-team 230 /ee/app/finders/security/ @gitlab-org/secure/threat-insights-backend-team 231 /ee/app/models/security/ @gitlab-org/secure/threat-insights-backend-team 232 /ee/app/models/vulnerabilities/ @gitlab-org/secure/threat-insights-backend-team 233 /ee/app/policies/vulnerabilities/ @gitlab-org/secure/threat-insights-backend-team 234 /ee/app/policies/vulnerability*.rb @gitlab-org/secure/threat-insights-backend-team 236 /ee/lib/api/vulnerabilit*.rb @gitlab-org/secure/threat-insights-backend-team 237 /ee/spec/policies/vulnerabilities/ @gitlab-org/secure/threat-insights-backend-team [all …]
|
/dports/games/freeorion/freeorion-0.4.10.2/default/python/AI/ |
H A D | fleet_orders.py | 198 threat = f_threat + m_threat + p_threat 204 if fleet_rating >= safety_factor * threat and fleet_rating_vs_planets >= p_threat: 222 if (my_other_fleet_rating > 3 * safety_factor * threat or 223 …is_military and total_rating_vs_planets > 2.5*p_threat and total_rating > safety_factor * threat)): 226 … (self.fleet.id, fleet_rating, system_id, sys1_name, self.target.id, target_system_name, threat))) 228 elif (threat == p_threat and 237 threat)) 242 self.target.id, target_system_name, threat) 547 …total_threat = sum(system_status.get(threat, 0) for threat in ('fleetThreat', 'planetThreat', 'mon…
|
/dports/security/vuls/vuls-0.13.7/vendor/github.com/knqyf263/gost/db/ |
H A D | microsoft.go | 160 threat := models.MicrosoftThreat{ 167 threat.Products = append(threat.Products, th.Products...) 169 uniqImpact[t.Description] = threat 172 threat.Products = append(threat.Products, th.Products...) 175 uniqSeverity[t.Description] = threat
|
/dports/games/sjeng/Sjeng-Free-11.2/ |
H A D | search.c | 484 int bound, threat, donull, best, sbest, best_score, old_ep; in search() local 530 threat = 0; in search() 649 threat = FALSE; in search() 701 && (threat == FALSE) in search() 747 threat = TRUE; in search() 754 else if (threat == TRUE) in search() 988 StoreTT(score, originalalpha, beta, i, threat, depth); in search() 1014 StoreTT(INF-ply, originalalpha, beta, 0, threat, depth); in search() 1025 StoreTT(-INF+ply, originalalpha, beta, 0, threat, depth); in search() 1030 StoreTT(0, originalalpha, beta, 0, threat, depth); in search() [all …]
|
/dports/games/pcgen/pcgen/data/pathfinder/paizo/player_companion/blood_of_the_moon/ |
H A D | botm_equip_magic_items.lst | 14 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 15 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 16 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 17 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 18 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 19 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 20 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing… 21 … SPROP:Adds bite attack of wearer's size or doubles critical threat range for existing…
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/check_point/mgmt/ |
H A D | README.md | 158 * `cp_mgmt_threat_exception` – Manages threat-exception objects on Check Point over Web Services API 159 * `cp_mgmt_threat_exception_facts` – Get threat-exception objects facts on Check Point over Web Ser… 160 * `cp_mgmt_threat_indicator` – Manages threat-indicator objects on Check Point over Web Services API 161 * `cp_mgmt_threat_indicator_facts` – Get threat-indicator objects facts on Check Point over Web Ser… 162 * `cp_mgmt_threat_layer` – Manages threat-layer objects on Check Point over Web Services API 163 * `cp_mgmt_threat_layer_facts` – Get threat-layer objects facts on Check Point over Web Services API 164 * `cp_mgmt_threat_profile` – Manages threat-profile objects on Check Point over Web Services API 165 * `cp_mgmt_threat_profile_facts` – Get threat-profile objects facts on Check Point over Web Service… 167 * `cp_mgmt_threat_rule` – Manages threat-rule objects on Check Point over Web Services API 168 * `cp_mgmt_threat_rule_facts` – Get threat-rule objects facts on Check Point over Web Services API
|
/dports/games/pcgen/pcgen/data/pathfinder/paizo/player_companion/alchemy_manual/ |
H A D | am_abilities_class.lst | 15 …threat range of her next attack that round increases by 1 (for example, a critical threat range of…
|