Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 463 for masking (0.06 sec)

  1. .github/workflows/invalid_question.yml

            stale-issue-label: "status:stale"
            days-before-stale: 0
            days-before-close: 30
            remove-stale-when-updated: true
    Registered: Sun Sep 07 09:35:13 UTC 2025
    - Last Modified: Tue Apr 11 02:27:05 UTC 2023
    - 1.2K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/CompactHashSet.java

     * add(x)} operations <i>do not</i> create objects for the garbage collector to deal with, and for
     * every element added, the garbage collector will have to traverse {@code 1.5} references on
     * average, in the marking phase, not {@code 5.0} as in {@code java.util.HashSet}.
     *
     * <p>If there are no removals, then {@link #iterator iteration} order is the same as insertion
     * order. Any removal invalidates any ordering guarantees.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Wir bauen auf dem vorherigen Kapitel auf.
    
    ## Über JWT
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 con Password (y hashing), Bearer con tokens JWT
    
    Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras.
    
    Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.
    
    Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo.
    
    ## Acerca de JWT
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/net/InetAddresses.java

          addressAsLong = ByteBuffer.wrap(ip6.getAddress(), 0, 8).getLong();
        }
    
        // Many strategies for hashing are possible. This might suffice for now.
        int coercedHash = Hashing.murmur3_32_fixed().hashLong(addressAsLong).asInt();
    
        // Squash into 224/4 Multicast and 240/4 Reserved space (i.e. 224/3).
        coercedHash |= 0xe0000000;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  6. docs/de/docs/tutorial/security/simple-oauth2.md

    Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System.
    
    Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück.
    
    #### Passwort-HashingHashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  8. misc/chrome/gophertool/manifest.json

    {
      "name": "Hacking Gopher",
      "version": "1.0",
      "manifest_version": 2,
      "description": "Go Hacking utility",
      "background": {
        "page": "background.html"
      },
      "browser_action": {
        "default_icon": "gopher.png",
        "default_popup": "popup.html"
      },
      "omnibox": { "keyword": "golang" },
      "icons": {
        "16": "gopher.png"
      },
      "permissions": [
         "tabs"
      ]
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Thu Jul 05 20:52:13 UTC 2012
    - 378 bytes
    - Viewed (0)
  9. ci/official/containers/ml_build/setup.sources.sh

    # limitations under the License.
    # ==============================================================================
    #
    # Sets up custom apt sources for our TF images.
    
    # Prevent apt install tzinfo from asking our location (assumes UTC)
    export DEBIAN_FRONTEND=noninteractive
    
    # Set up shared custom sources
    apt-get update
    apt-get install -y gnupg ca-certificates
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Thu Oct 03 21:13:05 UTC 2024
    - 1.6K bytes
    - Viewed (0)
  10. src/main/resources/fess_indices/_cloud/fess/doc.json

              "mapping": {
                "type": "text",
                "analyzer": "empty_analyzer"
              }
            }
          },
          {
            "lang_ca": {
              "match": "*_ca",
              "mapping": {
                "type": "text",
                "analyzer": "catalan_analyzer"
              }
            }
          },
          {
            "lang_ca": {
              "match": "*_ckb-iq",
              "mapping": {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 15 11:50:35 UTC 2023
    - 11.7K bytes
    - Viewed (0)
Back to top