- Sort Score
- Result 10 results
- Languages All
Results 111 - 120 of 171 for segura (0.03 sec)
-
src/cmd/asm/internal/arch/arch.go
name := fmt.Sprintf("V%d", i-riscv.REG_V0) register[name] = int16(i) } // General registers with ABI names. register["ZERO"] = riscv.REG_ZERO register["RA"] = riscv.REG_RA register["SP"] = riscv.REG_SP register["GP"] = riscv.REG_GP register["TP"] = riscv.REG_TP register["T0"] = riscv.REG_T0 register["T1"] = riscv.REG_T1 register["T2"] = riscv.REG_T2
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Nov 07 02:20:14 UTC 2024 - 21.7K bytes - Viewed (0) -
docs/es/docs/advanced/security/oauth2-scopes.md
El más común es el flujo implícito. El más seguro es el flujo de código, pero es más complejo de implementar ya que requiere más pasos. Como es más complejo, muchos proveedores terminan sugiriendo el flujo implícito. /// note | Nota
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.8K bytes - Viewed (0) -
src/main/resources/fess_label_pl.properties
labels.dict_stopwords_button_download = Pobierz labels.dict_stopwords_button_upload = Prześlij labels.dict_stopwords_file = Plik stop-słów labels.boost_document_rule_configuration=Reguła wzmocnienia dokumentu labels.boost_document_rule_title_details=Reguła wzmocnienia dokumentu labels.boost_document_rule_list_url_expr=Warunek labels.boost_document_rule_url_expr=Warunek labels.boost_document_rule_boost_expr=Wyrażenie wzmocnienia
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 10 04:56:21 UTC 2025 - 44.6K bytes - Viewed (0) -
cmd/perf-tests.go
if region == "" { region = "us-east-1" } clnt, err = minio.New(globalLocalNodeName, &minio.Options{ Creds: credentials.NewStaticV4(opts.creds.AccessKey, opts.creds.SecretKey, opts.creds.SessionToken), Secure: globalIsTLS, Transport: globalRemoteTargetTransport, Region: region, }) if err != nil { return res, err } } var mu sync.Mutex var uploadTimes madmin.TimeDurations
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 11.7K bytes - Viewed (0) -
docs/ko/docs/tutorial/extra-models.md
특히 사용자 모델의 경우에 그러한데, 왜냐하면: * **입력 모델** 은 비밀번호를 가져야 합니다. * **출력 모델** 은 비밀번호를 가지면 안됩니다. * **데이터베이스 모델** 은 해시처리된 비밀번호를 가질 것입니다. /// danger | 위험 절대 사용자의 비밀번호를 평문으로 저장하지 마세요. 항상 이후에 검증 가능한 "안전한 해시(secure hash)"로 저장하세요. 만약 이게 무엇인지 모르겠다면, [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.에서 비밀번호 해시에 대해 배울 수 있습니다. /// ## 다중 모델
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Fri May 30 13:38:33 UTC 2025 - 8.4K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/transformer/impl/XpathTransformer.java
* responseData.setBody(new ByteArrayInputStream("<html><head><title>Example</title></head><body><p>Hello World</p></body></html>".getBytes())); * responseData.setUrl("http://example.com"); * * ResultData resultData = new ResultData(); * * transformer.storeData(responseData, resultData); * * String xmlData = new String(resultData.getData(), resultData.getEncoding());
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Sun Jul 06 02:13:03 UTC 2025 - 13.1K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/util/GsaConfigParser.java
*/ public GsaConfigParser() { super(); } /** * Parses a GSA configuration XML file from the given input source. * This method configures a secure SAX parser and processes the XML content * to extract configuration information for web and file crawling. * * @param is the input source containing the GSA configuration XML
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 21.5K bytes - Viewed (0) -
src/test/java/jcifs/config/DelegatingConfigurationTest.java
boolean dfsStrictView = delegatingConfig.isDfsStrictView(); // Then assertTrue(smb2Only, "Should delegate SMB2 only negotiation"); assertFalse(secureNegotiate, "Should delegate secure negotiate requirement"); assertTrue(ntlmTargetName, "Should delegate NTLM target name setting"); assertFalse(port139Failover, "Should delegate port 139 failover setting");
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 20.7K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/spnego/SpnegoAuthenticator.java
* which is commonly used for Kerberos-based authentication in Windows environments. * It handles the negotiation between client and server to establish a secure * authentication context without requiring users to explicitly enter credentials. * * The authenticator supports various configuration options including delegation,
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 17.2K bytes - Viewed (3)