Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for compromised (0.07 sec)

  1. mvnw.cmd

           "$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^
           "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^
           "  Write-Error 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^
           "  Write-Error 'Investigate or delete %WRAPPER_JAR% to attempt a clean download.';"^
           "  Write-Error 'If you updated your Maven version, you need to update the specified wrapperSha256Sum property.';"^
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 14 22:24:15 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

         * Most TLS clients that connect to hosts on the public Internet should call this method.
         * Otherwise it is necessary to manually prepare a comprehensive set of trusted roots.
         *
         * If the host platform is compromised or misconfigured this may contain untrustworthy root
         * certificates. Applications that connect to a known set of servers may be able to mitigate
         * this problem with [certificate pinning][CertificatePinner].
         */
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  3. docs/en/docs/features.md

        * UUID.
        * ...and others.
    
    All the validation is handled by the well-established and robust **Pydantic**.
    
    ### Security and authentication
    
    Security and authentication integrated. Without any compromise with databases or data models.
    
    All the security schemes defined in OpenAPI, including:
    
    * HTTP Basic.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Thu Aug 15 23:30:12 UTC 2024
    - 9.2K bytes
    - Viewed (0)
Back to top