- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 502 for securely (0.08 sec)
-
guava/src/com/google/common/io/RecursiveDeleteOption.java
@J2ObjCIncompatible // java.nio.file @ElementTypesAreNonnullByDefault public enum RecursiveDeleteOption { /** * Specifies that the recursive delete should not throw an exception when it can't be guaranteed * that it can be done securely, without vulnerability to race conditions (i.e. when the file * system does not support {@link SecureDirectoryStream}). * * <p><b>Warning:</b> On a file system that supports symbolic links, it is possible for an
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 16:07:00 UTC 2024 - 2K bytes - Viewed (0) -
android/guava/src/com/google/common/io/RecursiveDeleteOption.java
@J2ObjCIncompatible // java.nio.file @ElementTypesAreNonnullByDefault public enum RecursiveDeleteOption { /** * Specifies that the recursive delete should not throw an exception when it can't be guaranteed * that it can be done securely, without vulnerability to race conditions (i.e. when the file * system does not support {@link SecureDirectoryStream}). * * <p><b>Warning:</b> On a file system that supports symbolic links, it is possible for an
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 16:07:00 UTC 2024 - 2K bytes - Viewed (0) -
SECURITY.md
# Using TensorFlow Securely This document discusses the TensorFlow security model. It describes the security risks to consider when using models, checkpoints or input data for training or serving. We also provide guidelines on what constitutes a vulnerability in TensorFlow and how to report them. This document applies to other repositories in the TensorFlow organization, covering security practices for the entirety of the TensorFlow ecosystem.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/hotfixes.md
Author: Harshavardhana <******@****.***> Date: Sat Jun 15 11:27:17 2019 -0700 [security] Match ${aws:username} exactly instead of prefix match (#7791) This PR fixes a security issue where an IAM user based on his policy is granted more privileges than restricted by the users IAM policy. This is due to an issue of prefix based Matcher() function
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Feb 14 21:36:02 UTC 2024 - 5K bytes - Viewed (0) -
common-protos/k8s.io/api/certificates/v1/generated.proto
// 1. client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client-kubelet" signerName). // 2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the "kubernetes.io/kubelet-serving" signerName). // // This API can be used to request client certificates to authenticate to kube-apiserver // (with the "kubernetes.io/kube-apiserver-client" signerName),
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 11.6K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates. The idea is to automate the acquisition and renewal of these certificates so that you can have **secure HTTPS, for free, forever**.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 12K bytes - Viewed (0) -
docs/kms/IAM.md
and the old credentials had to be removed once the rotation completed. This process is now gone. The root credentials can now be changed easily. > Does this mean I need an enterprise KMS setup to run MinIO (securely)? No, MinIO does not depend on any third-party KMS provider. You have three options here: - Run MinIO without a KMS. In this case all IAM data will be stored in plain-text.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
* Explicitly opting into behavioral changes can be acceptable. For example, introducing Istio multi-cluster semantics. * Ensure traffic between mesh workloads is securely encrypted with an Istio identity. * Be lightweight enough to not limit adoption. * This puts a much tighter budget on CPU, memory, latency, and throughput requirements than traditional Istio sidecars.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0) -
android/guava/src/com/google/common/io/Files.java
* * @return the newly-created directory * @throws IllegalStateException if the directory could not be created, such as if the system does * not support creating temporary directories securely * @deprecated For Android users, see the <a * href="https://developer.android.com/training/data-storage" target="_blank">Data and File
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Jul 22 19:03:12 UTC 2024 - 33.1K bytes - Viewed (0) -
guava/src/com/google/common/io/Files.java
* * @return the newly-created directory * @throws IllegalStateException if the directory could not be created, such as if the system does * not support creating temporary directories securely * @deprecated For Android users, see the <a * href="https://developer.android.com/training/data-storage" target="_blank">Data and File
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Jul 22 19:03:12 UTC 2024 - 33.1K bytes - Viewed (0)