- Sort Score
- Num 10 results
- Language All
Results 131 - 140 of 487 for Scripts (0.07 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/ru/docs/environment-variables.md
* `/bin` * `/usr/sbin` * `/sbin` //// //// tab | Windows ```plaintext C:\Program Files\Python312\Scripts;C:\Program Files\Python312;C:\Windows\System32 ``` Это означает, что система должна искать программы в каталогах: * `C:\Program Files\Python312\Scripts` * `C:\Program Files\Python312` * `C:\Windows\System32` ////
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 12.5K bytes - Click Count (0) -
docs/uk/docs/environment-variables.md
* `/bin` * `/usr/sbin` * `/sbin` //// //// tab | Windows ```plaintext C:\Program Files\Python312\Scripts;C:\Program Files\Python312;C:\Windows\System32 ``` Це означає, що система має шукати програми в каталогах: * `C:\Program Files\Python312\Scripts` * `C:\Program Files\Python312` * `C:\Windows\System32` ////
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:27:41 GMT 2026 - 11.5K bytes - Click Count (0) -
.github/labeler.yml
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Feb 21 16:26:38 GMT 2026 - 888 bytes - Click Count (0) -
docs/pt/docs/environment-variables.md
* `/bin` * `/usr/sbin` * `/sbin` //// //// tab | Windows ```plaintext C:\Program Files\Python312\Scripts;C:\Program Files\Python312;C:\Windows\System32 ``` Isso significa que o sistema deve procurar programas nos diretórios: * `C:\Program Files\Python312\Scripts` * `C:\Program Files\Python312` * `C:\Windows\System32` ////
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 8.4K bytes - Click Count (0) -
LICENSE
The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Apr 23 18:58:53 GMT 2021 - 33.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.7.md
- [kubeadm](#kubeadm) - [Cloud Providers](#cloud-providers) - [**Known Issues**](#known-issues) - [**Deprecations**](#deprecations) - [Cluster provisioning scripts](#cluster-provisioning-scripts) - [Client libraries](#client-libraries) - [DaemonSet](#daemonset) - [kube-proxy](#kube-proxy) - [Namespace](#namespace) - [Scheduling](#scheduling)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 308.7K bytes - Click Count (1) -
docs/es/docs/advanced/strict-content-type.md
Este comportamiento por defecto provee protección contra una clase de ataques de **Cross-Site Request Forgery (CSRF)** en un escenario muy específico. Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando: * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`) * y no envían credenciales de autenticación.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:12:26 GMT 2026 - 3.4K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico. Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando: - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`) - e não enviam nenhuma credencial de autenticação.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Ce comportement par défaut offre une protection contre une catégorie d’attaques de Cross-Site Request Forgery (CSRF) dans un scénario très spécifique. Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils : * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`)
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
scripts/tests/test_translation_fixer/test_complex_doc/data/translated_doc_expected.md
``` ```toml # Это пример блока кода на TOML title = "TOML Example" # Заголовок документа ``` ```console // Используйте команду "live" и передайте код языка в качестве аргумента CLI $ python ./scripts/docs.py live es <span style="color: green;">[INFO]</span> Serving on http://127.0.0.1:8008 <span style="color: green;">[INFO]</span> Start watching changes <span style="color: green;">[INFO]</span> Start detecting changes
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Tue Feb 17 08:08:04 GMT 2026 - 10.9K bytes - Click Count (0)