- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 1,283 for are (0.03 sec)
-
src/main/java/jcifs/SmbConstants.java
/** * Long file names are supported flag. */ int FLAGS2_LONG_FILENAMES = 0x0001; /** * Extended attributes are supported flag. */ int FLAGS2_EXTENDED_ATTRIBUTES = 0x0002; /** * Security signatures are supported flag. */ int FLAGS2_SECURITY_SIGNATURES = 0x0004; /** * Security signatures are required flag. */Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 24 00:49:49 UTC 2025 - 12.8K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
docs/en/docs/async.md
Beautiful illustrations by <a href="https://www.instagram.com/ketrinadrawsalot" class="external-link" target="_blank">Ketrina Thompson</a>. 🎨 /// --- Imagine you are the computer / program 🤖 in that story. While you are at the line, you are just idle 😴, waiting for your turn, not doing anything very "productive". But the line is fast because the cashier is only taking the orders (not preparing them), so that's fine.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:56:21 UTC 2025 - 24K bytes - Viewed (0) -
docs/bucket/replication/DESIGN.md
replication works similar to regular replication. Objects qualifying for existing object replication are detected when scanner runs, and will be replicated if existing object replication is enabled and applicable replication rules are satisfied. Because replication depends on the immutability of versions, only pre-existing objects created while versioning was enabled can be replicated. Even if replication rules are disabled and re-enabled later, the objects created during the interim will be synced as the...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 14.7K bytes - Viewed (0) -
docs/bucket/versioning/README.md
level. Only MinIO generates version IDs, and they can't be edited. Version IDs are simply of `DCE 1.1 v4 UUID 4` (random data based), UUIDs are 128 bit numbers which are intended to have a high likelihood of uniqueness over space and time and are computationally difficult to guess. They are globally unique identifiers which can be locally generated without contacting a global registration authority. UUIDs are intended as unique identifiers for both mass tagging objects with an extremely short...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 12K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5.5K bytes - Viewed (0) -
src/test/java/jcifs/dcerpc/msrpc/MsrpcSamrOpenDomainTest.java
// Verify that ptype is set to 0 assertEquals(0, msrpcSamrOpenDomain.getPtype(), "ptype should be initialized to 0"); // Verify that flags are set correctly (DCERPC_FIRST_FRAG | DCERPC_LAST_FRAG) // The actual values for DCERPC_FIRST_FRAG and DCERPC_LAST_FRAG are typically 0x01 and 0x02 respectively. int expectedFlags = 0x01 | 0x02; // DCERPC_FIRST_FRAG | DCERPC_LAST_FRAGRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 1.7K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
### Return the error { #return-the-error } After detecting that the credentials are incorrect, return an `HTTPException` with a status code 401 (the same returned when no credentials are provided) and add the header `WWW-Authenticate` to make the browser show the login prompt again:Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
src/test/java/jcifs/smb1/smb1/SmbConstantsTest.java
* demonstration – the real class behaviour is not required for * validating constants. */ public class SmbConstantsTest { /** * Verify that the hard‑coded default values are present. */ @Test @DisplayName("Default constant values match expectations") void defaultValues() { assertEquals(445, SmbConstants.DEFAULT_PORT);Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/en/docs/advanced/advanced-dependencies.md
/// tip All this might seem contrived. And it might not be very clear how is it useful yet. These examples are intentionally simple, but show how it all works. In the chapters about security, there are utility functions that are implemented in this same way. If you understood all this, you already know how those utility tools for security work underneath.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.6K bytes - Viewed (0)