Search Options

Results per page
Sort
Preferred Languages
Advance

Results 251 - 260 of 298 for insecure (0.04 sec)

  1. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  2. src/test/java/jcifs/internal/smb2/Smb2SigningDigestTest.java

                assertFalse(isValid, "Different session keys should fail verification");
            }
        }
    
        @Nested
        @DisplayName("Secure Key Wiping Tests")
        class SecureKeyWipingTests {
    
            @Test
            @DisplayName("Should securely wipe signing key")
            void testSecureWipeKey() throws GeneralSecurityException {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 43.7K bytes
    - Viewed (0)
  3. src/test/java/jcifs/config/DelegatingConfigurationTest.java

            boolean dfsStrictView = delegatingConfig.isDfsStrictView();
    
            // Then
            assertTrue(smb2Only, "Should delegate SMB2 only negotiation");
            assertFalse(secureNegotiate, "Should delegate secure negotiate requirement");
            assertTrue(ntlmTargetName, "Should delegate NTLM target name setting");
            assertFalse(port139Failover, "Should delegate port 139 failover setting");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 20.7K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  6. docs/config/README.md

    ### Certificate Directory
    
    TLS certificates by default are expected to be stored under ``${HOME}/.minio/certs`` directory. You need to place certificates here to enable `HTTPS` based access. Read more about [How to secure access to MinIO server with TLS](https://docs.min.io/community/minio-object-store/operations/network-encryption.html).
    
    Following is a sample directory structure for MinIO server with TLS certificates.
    
    ```sh
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.1K bytes
    - Viewed (1)
  7. apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt

    for claims brought by any other entity based on infringement of intellectual
    property rights or otherwise. As a condition to exercising the rights and
    licenses granted hereunder, each Recipient hereby assumes sole responsibility
    to secure any other intellectual property rights needed, if any. For example,
    if a third party patent license is required to allow Recipient to distribute
    the Program, it is Recipient's responsibility to acquire that license before
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Mon Sep 17 05:50:12 UTC 2018
    - 11.1K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/util/GsaConfigParser.java

         */
        public GsaConfigParser() {
            super();
        }
    
        /**
         * Parses a GSA configuration XML file from the given input source.
         * This method configures a secure SAX parser and processes the XML content
         * to extract configuration information for web and file crawling.
         *
         * @param is the input source containing the GSA configuration XML
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 21.6K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/bigger-applications.md

    But we still want to set a custom `prefix` when including the `APIRouter` so that all its *path operations* start with `/admin`, we want to secure it with the `dependencies` we already have for this project, and we want to include `tags` and `responses`.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 10 08:55:32 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  10. cmd/server-main.go

    		Hidden: true,
    		Value:  2048,
    		EnvVar: "MINIO_MAX_IDLE_CONNS_PER_HOST",
    	},
    	cli.StringSliceFlag{
    		Name:  "ftp",
    		Usage: "enable and configure an FTP(Secure) server",
    	},
    	cli.StringSliceFlag{
    		Name:  "sftp",
    		Usage: "enable and configure an SFTP server",
    	},
    	cli.StringFlag{
    		Name:   "crossdomain-xml",
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue May 27 15:18:36 UTC 2025
    - 35.9K bytes
    - Viewed (4)
Back to top