- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 76 for Rguest (0.24 sec)
-
src/main/java/org/codelibs/fess/Constants.java
public static final String PROCESS_TYPE_BOTH = "B"; public static final long ONE_DAY_IN_MILLIS = 24L * 60L * 60L * 1000L; public static final String GUEST_USER = "guest"; public static final String[] PAGER_CONVERSION_RULE = { "allRecordCount", "pageSize", "currentPageNumber", "allPageCount", "existPrePage", "existNextPage" }; // crawler types
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Aug 22 12:43:18 UTC 2024 - 16.6K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`. Then the Python code in your application would be equivalent to something like: ```Python
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 16:01:27 UTC 2024 - 4.8K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
/** The key of the configuration. e.g. {role}guest */ String ROLE_SEARCH_DEFAULT_DISPLAY_PERMISSIONS = "role.search.default.display.permissions"; /** The key of the configuration. e.g. {role}guest */ String ROLE_SEARCH_GUEST_PERMISSIONS = "role.search.guest.permissions"; /** The key of the configuration. e.g. 1 */
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Fri Oct 11 21:11:58 UTC 2024 - 468.5K bytes - Viewed (1) -
src/main/java/jcifs/netbios/NbtAddress.java
public <T extends Address> T unwrap ( Class<T> type ) { if ( type.isAssignableFrom(this.getClass()) ) { return (T) this; } return null; } /** * Guess next called name to try for session establishment. These * methods are used by the smb package. * * @return guessed name */ @Override public String firstCalledName () {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 15.2K bytes - Viewed (0) -
docs/sts/wso2.md
### 2. Configure WSO2 Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens 1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 8.7K bytes - Viewed (0) -
cmd/net.go
return "", "", err } host = addr switch scheme { case "https": port = "443" case "http": port = "80" default: return "", "", errors.New("unable to guess port from scheme") } } return host, port, nil } // isLocalHost - checks if the given parameter // correspond to one of the local IP of the // current machine
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jun 19 14:34:00 UTC 2024 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/io/TempFileCreator.java
* layer of fallback before consulting the system property, we could try * com.sun.security.auth.module.NTSystem. * * But for now, we use the value from the system property as our best guess. */ return fromSystemProperty; } catch (InvocationTargetException e) { throwIfUnchecked(e.getCause()); // in case it's an Error or something
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 06 17:11:11 UTC 2023 - 12.5K bytes - Viewed (0) -
docs/bucket/versioning/README.md
version IDs, and they can't be edited. Version IDs are simply of `DCE 1.1 v4 UUID 4` (random data based), UUIDs are 128 bit numbers which are intended to have a high likelihood of uniqueness over space and time and are computationally difficult to guess. They are globally unique identifiers which can be locally generated without contacting a global registration authority. UUIDs are intended as unique identifiers for both mass tagging objects with an extremely short lifetime and to reliably identifying...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 04 21:43:52 UTC 2023 - 11.9K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableLongArray.java
* * <p><b>Performance note:</b> When feasible, {@code initialCapacity} should be the exact number * of values that will be added, if that knowledge is readily available. It is better to guess a * value slightly too high than slightly too low. If the value is not exact, the {@link * ImmutableLongArray} that is built will very likely occupy more memory than strictly necessary;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 22.3K bytes - Viewed (0) -
guava/src/com/google/common/primitives/ImmutableIntArray.java
* * <p><b>Performance note:</b> When feasible, {@code initialCapacity} should be the exact number * of values that will be added, if that knowledge is readily available. It is better to guess a * value slightly too high than slightly too low. If the value is not exact, the {@link * ImmutableIntArray} that is built will very likely occupy more memory than strictly necessary;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 21.4K bytes - Viewed (0)