Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 101 - 110 of 707 for blog (0.04 seconds)

  1. .github/workflows/update-rbe.yml

              - https://github.com/tensorflow/tensorflow/blob/master/tensorflow/tools/toolchains/remote_config/configs.bzl
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Thu Jan 01 08:09:03 GMT 2026
    - 7.2K bytes
    - Click Count (1)
  2. docs/ru/docs/advanced/strict-content-type.md

    Эти атаки используют то, что браузеры позволяют скриптам отправлять запросы без выполнения CORS preflight, когда они:
    
    - не имеют заголовка `Content-Type` (например, при использовании `fetch()` с телом `Blob`)
    - и не отправляют никаких учетных данных аутентификации.
    
    Этот тип атак в основном актуален, когда:
    
    - приложение запускается локально (например, на `localhost`) или во внутренней сети
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 5.6K bytes
    - Click Count (0)
  3. docs/en/docs/advanced/strict-content-type.md

    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    * and don't send any authentication credentials.
    
    This type of attack is mainly relevant when:
    
    * the application is running locally (e.g. on `localhost`) or in an internal network
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  4. docs/pt/docs/advanced/strict-content-type.md

    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`)
    - e não enviam nenhuma credencial de autenticação.
    
    Esse tipo de ataque é relevante principalmente quando:
    
    - a aplicação está em execução localmente (por exemplo, em `localhost`) ou em uma rede interna
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  5. src/main/resources/fess_indices/fess/lv/stopwords.txt

    # https://github.com/apache/lucene-solr/blob/master/lucene/analysis/common/src/resources/org/apache/lucene/analysis/lv/stopwords.txt
    aiz
    ap
    ar
    apakš
    ārpus
    augšpus
    bez
    caur
    dēļ
    gar
    iekš
    iz
    kopš
    labad
    lejpus
    līdz
    no
    otrpus
    pa
    par
    pār
    pēc
    pie
    pirms
    pret
    priekš
    starp
    šaipus
    uz
    viņpus
    virs
    virspus
    zem
    apakšpus
    # Conjunctions
    un
    bet
    jo
    ja
    ka
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Thu Jul 19 06:31:02 GMT 2018
    - 1.2K bytes
    - Click Count (0)
  6. docs/tr/docs/advanced/openapi-callbacks.md

    * *path*, bir [OpenAPI 3 expression](https://github.com/OAI/OpenAPI-Specification/blob/master/versions/3.1.0.md#key-expression) (aşağıda daha fazlası) içerebilir; böylece parametreler ve sizin API'nize gönderilen orijinal request'in bazı parçalarıyla değişkenler kullanılabilir.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 8.3K bytes
    - Click Count (0)
  7. docs/fr/docs/advanced/strict-content-type.md

    * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`)
    * et n’envoient aucune information d’authentification.
    
    Ce type d’attaque est surtout pertinent lorsque :
    
    * l’application s’exécute localement (par ex. sur `localhost`) ou sur un réseau interne
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:33:45 GMT 2026
    - 3.9K bytes
    - Click Count (0)
  8. .github/workflows/pull-metadata.yml

          issues: write
          pull-requests: write
        runs-on: ubuntu-latest
        steps:
          # Check that PRs have proper metadata: labels and milestone
          # https://github.com/gradle/issue-management-action/blob/main/src/pull-metadata.ts
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Mon Aug 11 09:00:56 GMT 2025
    - 480 bytes
    - Click Count (0)
  9. docs/es/docs/advanced/strict-content-type.md

    Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando:
    
    * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`)
    * y no envían credenciales de autenticación.
    
    Este tipo de ataque es relevante principalmente cuando:
    
    * la aplicación corre localmente (p. ej. en `localhost`) o en una red interna
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:12:26 GMT 2026
    - 3.4K bytes
    - Click Count (0)
  10. docs/orchestration/docker-compose/README.md

    ## 2. Run Distributed MinIO on Docker Compose
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Oct 15 17:29:55 GMT 2025
    - 3.3K bytes
    - Click Count (0)
Back to Top