- Sort Score
- Result 10 results
- Languages All
Results 671 - 680 of 1,236 for Example (0.15 sec)
-
docs/distributed/DECOMMISSION.md
Decommissiong is a mechanism in MinIO to drain older pools (usually with old hardware) and migrate the content from such pools to a newer pools (usually better hardware). Decommissioning spreads the data across all pools - for example, if you decommission `pool1`, all the data from `pool1` spreads across `pool2` and `pool3`. ## Features
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jul 11 14:59:49 UTC 2022 - 8.3K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/client/smb1/SmbClient.java
* </p> * * <p> * The class uses JCIFS properties to configure the SMB connection. * </p> * * <p> * Usage example: * </p> * * <pre> * {@code * SmbClient smbClient = new SmbClient(); * smbClient.init(); * ResponseData responseData = smbClient.doGet("smb1://example.com/share/file.txt"); * // Process the responseData * smbClient.close(); * } * </pre> * */
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Sep 18 09:30:45 UTC 2025 - 23K bytes - Viewed (0) -
docs/compression/README.md
Combining encryption and compression is not safe in all setups. This is particularly so if the compression ratio of your content reveals information about it. See [CRIME TLS](https://en.wikipedia.org/wiki/CRIME) as an example of this. Therefore, compression is disabled when encrypting by default, and must be enabled separately. Consult our security experts on [SUBNET](https://min.io/pricing) to help you evaluate if
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 5.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
<img src="/img/tutorial/security/image12.png"> ## Check the username { #check-the-username } Here's a more complete example. Use a dependency to check if the username and password are correct.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
src/test/java/jcifs/util/StringsTest.java
"'smb2://admin:admin123@192.168.1.1/folder', 'smb2://admin:******@192.168.1.1/folder'", "'smbs://test:p@ssw0rd@example.com/share', 'smbs://test:******@example.com/share'" }) void testMaskSecretValueWithCredentials(String input, String expected) { // When String result = Strings.maskSecretValue(input); // ThenRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.6K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
/** * Returns the {@link InetAddress} having the given string representation. * * <p>This deliberately avoids all nameservice lookups (e.g. no DNS). * * <p>This method accepts non-ASCII digits, for example {@code "192.168.0.1"} (those are fullwidth * characters). That is consistent with {@link InetAddress}, but not with various RFCs. If you * want to accept ASCII digits only, you can use something like {@codeRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
docs/security/tls_configuration_history.md
<a name="http2_naughty"></a> #### ² HTTP/2 Cipher Suite Denylist Cipher suites that are [discouraged for use][http2_denylist] with HTTP/2. OkHttp includes them because better suites are not commonly available. For example, none of the better cipher suites listed above shipped with Android 4.4 or Java 7. [OkHttp30]: https://square.github.io/okhttp/changelog_3x/#version-300 [OkHttp310]: https://square.github.io/okhttp/changelog_3x/#version-310
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 16:35:36 UTC 2022 - 9K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/NullnessCasts.java
* never use this method, preferring instead to call {@code requireNonNull} so as to benefit from * its runtime check. * * <p>An example use case for this method is in implementing an {@code Iterator<T>} whose {@code * next} field is lazily initialized. The type of that field would be {@code @Nullable T}, and theRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 13 20:49:47 UTC 2025 - 4K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA | * FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: *
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
guava/src/com/google/common/base/Predicates.java
* * <p><b>Warning:</b> contrary to the typical assumptions about predicates (as documented at * {@link Predicate#apply}), the returned predicate may not be <i>consistent with equals</i>. For * example, {@code instanceOf(ArrayList.class)} will yield different results for the two equal * instances {@code Lists.newArrayList(1)} and {@code Arrays.asList(1)}. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 26.6K bytes - Viewed (0)