- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 15 for 2guest (1.69 sec)
-
src/main/resources/fess_indices/fess/ca/stopwords.txt
així això al als aleshores algun alguna algunes alguns alhora allà allí allò altra altre altres amb ambdós ambdues apa aquell aquella aquelles aquells aquest aquesta aquestes aquests aquí baix cada cadascú cadascuna cadascunes cadascuns com contra d'un d'una d'unes d'uns dalt de del dels des després dins
Plain Text - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Jul 19 06:31:02 GMT 2018 - 1.3K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`. Then the Python code in your application would be equivalent to something like: ```Python
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Jan 11 14:33:05 GMT 2024 - 5.9K bytes - Viewed (0) -
docs/bucket/versioning/README.md
version IDs, and they can't be edited. Version IDs are simply of `DCE 1.1 v4 UUID 4` (random data based), UUIDs are 128 bit numbers which are intended to have a high likelihood of uniqueness over space and time and are computationally difficult to guess. They are globally unique identifiers which can be locally generated without contacting a global registration authority. UUIDs are intended as unique identifiers for both mass tagging objects with an extremely short lifetime and to reliably identifying...
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu May 04 21:43:52 GMT 2023 - 11.9K bytes - Viewed (1) -
guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
soldiers did. After these came the royal children; there were ten of them, and the little dears came jumping merrily along hand in hand, in couples: they were all ornamented with hearts. Next came the guests, mostly Kings and Queens, and among them Alice recognised the White Rabbit: it was talking in a hurried nervous manner, smiling at everything that was said, and went by without
Plain Text - Registered: Fri Apr 12 12:43:09 GMT 2024 - Last Modified: Mon Oct 29 21:35:03 GMT 2012 - 145.2K bytes - Viewed (0) -
src/main/resources/fess_indices/fess_user.role/role.bulk
Plain Text - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Dec 02 13:14:56 GMT 2021 - 144 bytes - Viewed (0) -
mockwebserver/src/main/kotlin/mockwebserver3/Dispatcher.kt
* a CountdownLatch). */ @Throws(InterruptedException::class) abstract fun dispatch(request: RecordedRequest): MockResponse /** * Returns an early guess of the next response, used for policy on how an incoming request should * be received. The default implementation returns an empty response. Mischievous implementations
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Tue Jan 23 14:31:42 GMT 2024 - 1.7K bytes - Viewed (0) -
maven-core/src/site/apt/configuration-management.apt
plugin parameters and anything else. We once had a document that Vincent and I agreed upon and I was about to implement it and then I disappeared for 8 months so it never came to pass. So I guess it's important to figure out what people are using properties files for and see if we can't incorporate it all into the POM. Or if we do have properties file (something I would like to avoid) say they don't
Plain Text - Registered: Sun Apr 28 03:35:10 GMT 2024 - Last Modified: Mon Mar 18 00:24:53 GMT 2024 - 5.8K bytes - Viewed (0) -
tensorflow/c/experimental/next_pluggable_device/BUILD
"//tensorflow/core/tfrt/common:async_value_tensor", "//tensorflow/core/tfrt/common:pjrt_util", "@com_google_absl//absl/log:check", "@com_google_googletest//:gtest_main", "@local_tsl//tsl/lib/core:status_test_util", "@local_tsl//tsl/platform:casts", "@local_tsl//tsl/platform:status_matchers", "@local_tsl//tsl/protobuf:error_codes_proto_impl_cc",
Plain Text - Registered: Tue Feb 27 12:39:08 GMT 2024 - Last Modified: Tue Jan 09 00:52:04 GMT 2024 - 3.8K bytes - Viewed (0) -
CONTRIBUTING.md
If you need to check on [CI](http://builds.gradle.org/) status as an external contributor, you can click "Log in as guest". ## Useful tips ### How Gradle Works We have [a series of blog](https://blog.gradle.org/how-gradle-works-1) that explains how Gradle works. This may help you better understand and contribute to Gradle.
Plain Text - Registered: Wed May 08 11:36:15 GMT 2024 - Last Modified: Sat May 04 07:43:02 GMT 2024 - 15.6K bytes - Viewed (0) -
docs/sts/wso2.md
### 2. Configure WSO2 Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens 1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.7K bytes - Viewed (0)