Search Options

Results per page
Sort
Preferred Languages
Advance

Results 531 - 540 of 2,385 for scan (0.01 sec)

  1. docs/en/docs/advanced/security/http-basic-auth.md

    # HTTP Basic Auth { #http-basic-auth }
    
    For the simplest cases, you can use HTTP Basic Auth.
    
    In HTTP Basic Auth, the application expects a header that contains a username and a password.
    
    If it doesn't receive it, it returns an HTTP 401 "Unauthorized" error.
    
    And returns a header `WWW-Authenticate` with a value of `Basic`, and an optional `realm` parameter.
    
    That tells the browser to show the integrated prompt for a username and password.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/thumbnail/impl/BaseThumbnailGeneratorTest.java

            // Test isTarget method
            generator = new TestThumbnailGenerator();
            Map<String, Object> docMap = new HashMap<>();
    
            // Note: isTarget requires FessConfig which needs container
            // We can only verify the method handles missing container gracefully
            try {
                generator.isTarget(docMap);
            } catch (IllegalStateException e) {
                // Expected when container is not initialized
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 6.1K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/util/concurrent/UncheckedExecutionException.java

       *
       * @deprecated Prefer {@linkplain UncheckedExecutionException(Throwable)} a constructor that
       *     accepts a cause: Users of this class typically expect for instances to have a non-null
       *     cause. At the moment, you can <i>usually</i> still preserve behavior by passing an explicit
       *     {@code null} cause. Note, however, that passing an explicit {@code null} cause prevents
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Feb 13 17:34:21 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  4. guava/src/com/google/common/graph/SuccessorsFunction.java

     * someGraphAlgorithm(startNode, MyNode::getChildren);
     * }
     *
     * <p>If you have some other mechanism for returning the successors of a node, or one that doesn't
     * return an {@code Iterable<? extends N>}, then you can use a lambda to perform a more general
     * transformation:
     *
     * {@snippet :
     * someGraphAlgorithm(startNode, node -> ImmutableList.of(node.leftChild(), node.rightChild()));
     * }
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  5. src/main/java/jcifs/internal/smb1/com/SmbComLockingAndX.java

    /*
     * © 2017 AgNO3 Gmbh & Co. KG
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
     * but WITHOUT ANY WARRANTY; without even the implied warranty of
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb2/persistent/HandleGuid.java

    /*
     * © 2025 CodeLibs, Inc.
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
     * but WITHOUT ANY WARRANTY; without even the implied warranty of
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 23 02:21:31 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  7. src/test/java/jcifs/dcerpc/DcerpcErrorTest.java

        void testDcerpcExceptionIntegration() {
            // Test that DcerpcException can be created and implements DcerpcError
            DcerpcException ex1 = new DcerpcException("Test error", null);
            assertTrue(ex1 instanceof DcerpcError, "DcerpcException should implement DcerpcError");
    
            // Test that DcerpcException can be created with string messages
            DcerpcException ex2 = new DcerpcException("Access denied error");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7K bytes
    - Viewed (0)
  8. src/test/java/jcifs/smb1/smb1/TransTransactNamedPipeResponseTest.java

        }
    
        // Helper method to access the super.toString() for verification,
        // as we cannot call it directly from the test.
        // This requires a package-private or public method in the class under test,
        // or we can just check for the prefix and suffix.
        // For this test, I'll add a helper in the response class to get super.toString()
        // Or, more simply, check the format of the string.
        @Test
        void testToStringFormat() {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 5.3K bytes
    - Viewed (0)
  9. guava/src/com/google/common/math/BigIntegerMath.java

     *
     * <p>The implementations of many methods in this class are based on material from Henry S. Warren,
     * Jr.'s <i>Hacker's Delight</i>, (Addison Wesley, 2002).
     *
     * <p>Similar functionality for {@code int} and for {@code long} can be found in {@link IntMath} and
     * {@link LongMath} respectively.
     *
     * @author Louis Wasserman
     * @since 11.0
     */
    @GwtCompatible
    public final class BigIntegerMath {
      /**
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.8K bytes
    - Viewed (0)
  10. docs/sts/web-identity.md

    temporary security credentials returned by this API consists of an access key, a secret key, and a security token. Applications can use these temporary security credentials to sign calls to MinIO API operations.
    
    By default, the temporary security credentials created by AssumeRoleWithWebIdentity last for one hour. However, the optional DurationSeconds parameter can be used to specify the validity duration of the generated credentials. This value varies from 900 seconds (15 minutes) up to the...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
Back to top