OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:malware
(Results
51 - 75
of
178
) sorted by null
1
2
3
4
5
6
7
8
/external/chromium/chrome/browser/safe_browsing/
malware_details_cache.h
9
// A class that gets
malware
details from the HTTP Cache.
safe_browsing_service.h
6
// anti-
malware
tables and checking urls against them.
52
BINARY_MALWARE_URL, // Binary url leads to a
malware
.
53
BINARY_MALWARE_HASH, // Binary hash indicates this is a
malware
.
250
// Report hits to the unsafe contents (
malware
, phishing, unsafe download URL)
malware_details.cc
151
DVLOG(1) << "Starting to compute
malware
details.";
270
DLOG(ERROR) << "Unable to serialize the
malware
report.";
protocol_manager.h
145
//
malware
reports. |report| is the serialized report.
247
// Generates URL for reporting
malware
details for users who opt-in.
406
//
malware
reports for users who opt-in.
safe_browsing_blocking_page_test.cc
6
//
malware
and phishing urls. It then uses a real browser to go to
361
GURL malware_url("http://localhost/files/safe_browsing/
malware
.html");
388
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
protocol_manager.cc
667
// Sends
malware
details for users who opt-in.
772
// The
malware
and phishing hits go over HTTP.
801
// The
malware
details go over HTTPS.
803
"%s/clientreport/
malware
?client=%s&appver=%s&pver=1.0",
safe_browsing_service_browsertest.cc
376
const char kMalwarePage[] = "files/safe_browsing/
malware
.html";
379
IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest,
Malware
) {
417
// only
malware
was a prefetch target.
426
// However, when we navigate to the
malware
page, we should still get
/external/chromium_org/chrome/browser/renderer_host/
safe_browsing_resource_throttle.h
26
//
malware
/phishing blacklists (see SafeBrowsingService for details).
safe_browsing_resource_throttle.cc
59
// Save the redirect urls for possible
malware
detail reporting later.
/external/chromium_org/chrome/browser/resources/downloads/
downloads.css
129
.
malware
-description {
/external/chromium_org/chrome/browser/safe_browsing/
database_manager.h
6
// anti-
malware
tables and checking urls against them.
165
// Check if the given IP address (either IPv4 or IPv6) matches the
malware
181
// Check if the CSD
malware
IP matching kill switch is turned on.
399
// Indicate if the csd
malware
IP blacklist should be enabled.
malware_details_cache.h
8
// A class that gets
malware
details from the HTTP Cache.
client_side_detection_service.cc
46
//
malware
report type for UMA histogram counting.
78
"https://sb-ssl.google.com/safebrowsing/clientreport/
malware
-check";
89
// This is the original landing url, may not be the
malware
url.
373
DVLOG(1) << "Too many
malware
report requests sent recently."
374
<< "Skip sending
malware
report for " << GURL(request->url());
411
// Record that we made a
malware
request
malware_details.cc
159
DVLOG(1) << "Starting to compute
malware
details.";
309
DLOG(ERROR) << "Unable to serialize the
malware
report.";
browser_feature_extractor_unittest.cc
565
SimpleNavigateAndCommit(GURL("http://www.foo.com/
malware
.html"));
567
request.set_url("http://www.foo.com/
malware
.html");
572
browse_info_->unsafe_resource->url = GURL("http://www.
malware
.com/");
583
"http://www.
malware
.com/")));
ping_manager_unittest.cc
108
EXPECT_EQ("https://prefix.com/foo/clientreport/
malware
?"
/external/chromium_org/chrome/common/extensions/docs/templates/articles/
app_codelab_10_publishing.html
10
<li> Added security: all apps and extensions are checked for
Malware
signals.</li>
/external/chromium_org/chrome/browser/ui/views/toolbar/
site_chip_view.cc
117
// Detect client-side or SB
malware
/phishing hits.
330
// TODO(gbillock): We persist a
malware
setting while a new WebContents
332
// page as
malware
. Need to fix that.
/external/chromium/chrome/browser/renderer_host/
safe_browsing_resource_handler.h
22
//
malware
/phishing blacklists (see SafeBrowsingService for details).
/external/chromium/chrome/browser/resources/
safe_browsing_malware_block.html
150
<div class="icon"><img src="shared/images/phishing_icon.png" alt="
Malware
Icon" onmousedown="return false;"/></div>
/external/chromium_org/chrome/browser/
memory_details.h
28
RENDERER_INTERSTITIAL, //
malware
/phishing interstitial
/external/chromium_org/chrome/common/extensions/api/
privacy.json
40
"description": "If enabled, Chrome does its best to protect you from phishing and
malware
. This preference's value is a boolean, defaulting to <code>true</code>."
/external/chromium_org/chrome/renderer/
security_filter_peer.cc
59
// TODO(jcampan): use a different message when getting a phishing/
malware
/external/chromium_org/components/nacl/docs/dev/
index.html
85
<li>Protecting users from malicious code and
malware
.</li>
/external/chromium_org/components/webdata/common/
web_database.cc
124
// Some
malware
used to lower the version number, causing migration to
Completed in 1006 milliseconds
1
2
3
4
5
6
7
8