- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 62 for privileged (0.13 sec)
-
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/StringSearchModelInterpolator.java
InterpolateObjectAction action = new InterpolateObjectAction(obj, valueSources, postProcessors, debugEnabled, this, getLogger()); ModelInterpolationException error = AccessController.doPrivileged(action); if (error != null) { throw error; } } finally { getInterpolator().clearAnswers(); } }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 14.1K bytes - Viewed (0) -
src/packaging/deb/init.d/fess
### END INIT INFO PATH=/bin:/usr/bin:/sbin:/usr/sbin NAME=fess DESC="Fess Server" DEFAULT=/etc/default/$NAME if [ `id -u` -ne 0 ]; then echo "You need root privileges to run this script" exit 1 fi . /lib/lsb/init-functions if [ -r /etc/default/rcS ]; then . /etc/default/rcS fi # The following variables can be overwritten in $DEFAULT
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Sun Jan 15 06:32:15 UTC 2023 - 5.8K bytes - Viewed (0) -
SECURITY.md
from anywhere, and executes the graphs it is sent without performing any checks. Therefore, if you run a `tf.train.Server` in your network, anybody with access to the network can execute arbitrary code with the privileges of the user running the `tf.train.Server`. ## Untrusted inputs during training and prediction TensorFlow supports a wide range of input data formats. For example it can
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
src/test/java/org/codelibs/opensearch/extension/analysis/ReloadableKuromojiTokenizerFactory.java
return null; } } } private static Field getAccessibleField(final Class<?> clazz, final String name) { return AccessController.doPrivileged((PrivilegedAction<Field>) () -> { try { final Field field = clazz.getDeclaredField(name); field.setAccessible(true); return field;
Registered: Fri Nov 08 09:08:12 UTC 2024 - Last Modified: Thu Feb 22 01:36:54 UTC 2024 - 9.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
android/guava/src/com/google/common/cache/Striped64.java
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jun 14 17:55:55 UTC 2024 - 11.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
## Changelog since v1.8.0 ### Action Required
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
docs/en/docs/tutorial/handling-errors.md
This client could be a browser with a frontend, a code from someone else, an IoT device, etc. You could need to tell the client that: * The client doesn't have enough privileges for that operation. * The client doesn't have access to that resource. * The item the client was trying to access doesn't exist. * etc.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.1K bytes - Viewed (0) -
docs/en/docs/advanced/behind-a-proxy.md
``` This tells Traefik to listen on port 9999 and to use another file `routes.toml`. /// tip We are using port 9999 instead of the standard HTTP port 80 so that you don't have to run it with admin (`sudo`) privileges. /// Now create that other file `routes.toml`: ```TOML hl_lines="5 12 20" [http] [http.middlewares] [http.middlewares.api-stripprefix.stripPrefix] prefixes = ["/api/v1"]
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 16:49:49 UTC 2024 - 11.6K bytes - Viewed (0)