Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 171 for segura (0.03 sec)

  1. src/cmd/asm/internal/arch/arch.go

    		name := fmt.Sprintf("V%d", i-riscv.REG_V0)
    		register[name] = int16(i)
    	}
    
    	// General registers with ABI names.
    	register["ZERO"] = riscv.REG_ZERO
    	register["RA"] = riscv.REG_RA
    	register["SP"] = riscv.REG_SP
    	register["GP"] = riscv.REG_GP
    	register["TP"] = riscv.REG_TP
    	register["T0"] = riscv.REG_T0
    	register["T1"] = riscv.REG_T1
    	register["T2"] = riscv.REG_T2
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Thu Nov 07 02:20:14 UTC 2024
    - 21.7K bytes
    - Viewed (0)
  2. docs/es/docs/advanced/security/oauth2-scopes.md

    El más común es el flujo implícito.
    
    El más seguro es el flujo de código, pero es más complejo de implementar ya que requiere más pasos. Como es más complejo, muchos proveedores terminan sugiriendo el flujo implícito.
    
    /// note | Nota
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  3. src/main/resources/fess_label_pl.properties

    labels.dict_stopwords_button_download = Pobierz
    labels.dict_stopwords_button_upload = Prześlij
    labels.dict_stopwords_file = Plik stop-słów
    labels.boost_document_rule_configuration=Reguła wzmocnienia dokumentu
    labels.boost_document_rule_title_details=Reguła wzmocnienia dokumentu
    labels.boost_document_rule_list_url_expr=Warunek
    labels.boost_document_rule_url_expr=Warunek
    labels.boost_document_rule_boost_expr=Wyrażenie wzmocnienia
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 10 04:56:21 UTC 2025
    - 44.6K bytes
    - Viewed (0)
  4. cmd/perf-tests.go

    		if region == "" {
    			region = "us-east-1"
    		}
    		clnt, err = minio.New(globalLocalNodeName, &minio.Options{
    			Creds:     credentials.NewStaticV4(opts.creds.AccessKey, opts.creds.SecretKey, opts.creds.SessionToken),
    			Secure:    globalIsTLS,
    			Transport: globalRemoteTargetTransport,
    			Region:    region,
    		})
    		if err != nil {
    			return res, err
    		}
    	}
    
    	var mu sync.Mutex
    	var uploadTimes madmin.TimeDurations
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  5. docs/ko/docs/tutorial/extra-models.md

    특히 사용자 모델의 경우에 그러한데, 왜냐하면:
    
    * **입력 모델** 은 비밀번호를 가져야 합니다.
    * **출력 모델** 은 비밀번호를 가지면 안됩니다.
    * **데이터베이스 모델** 은 해시처리된 비밀번호를 가질 것입니다.
    
    /// danger | 위험
    
    절대 사용자의 비밀번호를 평문으로 저장하지 마세요. 항상 이후에 검증 가능한 "안전한 해시(secure hash)"로 저장하세요.
    
    만약 이게 무엇인지 모르겠다면, [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.에서 비밀번호 해시에 대해 배울 수 있습니다.
    
    ///
    
    ## 다중 모델
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Fri May 30 13:38:33 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  6. fess-crawler/src/main/java/org/codelibs/fess/crawler/transformer/impl/XpathTransformer.java

     * responseData.setBody(new ByteArrayInputStream("<html><head><title>Example</title></head><body><p>Hello World</p></body></html>".getBytes()));
     * responseData.setUrl("http://example.com");
     *
     * ResultData resultData = new ResultData();
     *
     * transformer.storeData(responseData, resultData);
     *
     * String xmlData = new String(resultData.getData(), resultData.getEncoding());
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sun Jul 06 02:13:03 UTC 2025
    - 13.1K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/util/GsaConfigParser.java

         */
        public GsaConfigParser() {
            super();
        }
    
        /**
         * Parses a GSA configuration XML file from the given input source.
         * This method configures a secure SAX parser and processes the XML content
         * to extract configuration information for web and file crawling.
         *
         * @param is the input source containing the GSA configuration XML
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 21.5K bytes
    - Viewed (0)
  9. src/test/java/jcifs/config/DelegatingConfigurationTest.java

            boolean dfsStrictView = delegatingConfig.isDfsStrictView();
    
            // Then
            assertTrue(smb2Only, "Should delegate SMB2 only negotiation");
            assertFalse(secureNegotiate, "Should delegate secure negotiate requirement");
            assertTrue(ntlmTargetName, "Should delegate NTLM target name setting");
            assertFalse(port139Failover, "Should delegate port 139 failover setting");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 20.7K bytes
    - Viewed (0)
  10. src/main/java/org/codelibs/fess/sso/spnego/SpnegoAuthenticator.java

     * which is commonly used for Kerberos-based authentication in Windows environments.
     * It handles the negotiation between client and server to establish a secure
     * authentication context without requiring users to explicitly enter credentials.
     *
     * The authenticator supports various configuration options including delegation,
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 17.2K bytes
    - Viewed (3)
Back to top