Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 77 for 2guest (0.06 sec)

  1. src/main/java/jcifs/config/BaseConfiguration.java

        protected DialectVersion maxVersion;
        protected boolean requireSecureNegotiate = true;
        protected boolean sendNTLMTargetName = true;
        private byte[] machineId;
        protected String guestUsername = "GUEST";
        protected String guestPassword = "";
        protected boolean allowGuestFallback = false;
    
    
        /**
         * @throws CIFSException
         * 
         */
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Thu Jan 05 13:06:39 UTC 2023
    - 20.4K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/Constants.java

        public static final String PROCESS_TYPE_BOTH = "B";
    
        public static final long ONE_DAY_IN_MILLIS = 24L * 60L * 60L * 1000L;
    
        public static final String GUEST_USER = "guest";
    
        public static final String[] PAGER_CONVERSION_RULE =
                { "allRecordCount", "pageSize", "currentPageNumber", "allPageCount", "existPrePage", "existNextPage" };
    
        // crawler types
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Thu Aug 22 12:43:18 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/security/http-basic-auth.md

    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Then the Python code in your application would be equivalent to something like:
    
    ```Python
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:01:27 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java

        /** The key of the configuration. e.g. {role}guest */
        String ROLE_SEARCH_DEFAULT_DISPLAY_PERMISSIONS = "role.search.default.display.permissions";
    
        /** The key of the configuration. e.g. {role}guest */
        String ROLE_SEARCH_GUEST_PERMISSIONS = "role.search.guest.permissions";
    
        /** The key of the configuration. e.g. 1 */
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Fri Oct 11 21:11:58 UTC 2024
    - 468.5K bytes
    - Viewed (1)
  5. src/main/java/jcifs/netbios/NbtAddress.java

        public <T extends Address> T unwrap ( Class<T> type ) {
            if ( type.isAssignableFrom(this.getClass()) ) {
                return (T) this;
            }
            return null;
        }
    
    
        /**
         * Guess next called name to try for session establishment. These
         * methods are used by the smb package.
         * 
         * @return guessed name
         */
        @Override
        public String firstCalledName () {
    
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 15.2K bytes
    - Viewed (0)
  6. docs/sts/wso2.md

    ### 2. Configure WSO2
    
    Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens
    
    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 8.7K bytes
    - Viewed (0)
  7. cmd/net.go

    			return "", "", err
    		}
    
    		host = addr
    
    		switch scheme {
    		case "https":
    			port = "443"
    		case "http":
    			port = "80"
    		default:
    			return "", "", errors.New("unable to guess port from scheme")
    		}
    	}
    
    	return host, port, nil
    }
    
    // isLocalHost - checks if the given parameter
    // correspond to one of the local IP of the
    // current machine
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jun 19 14:34:00 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  8. guava/src/com/google/common/io/TempFileCreator.java

             * layer of fallback before consulting the system property, we could try
             * com.sun.security.auth.module.NTSystem.
             *
             * But for now, we use the value from the system property as our best guess.
             */
            return fromSystemProperty;
          } catch (InvocationTargetException e) {
            throwIfUnchecked(e.getCause()); // in case it's an Error or something
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 06 17:11:11 UTC 2023
    - 12.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/primitives/ImmutableLongArray.java

       *
       * <p><b>Performance note:</b> When feasible, {@code initialCapacity} should be the exact number
       * of values that will be added, if that knowledge is readily available. It is better to guess a
       * value slightly too high than slightly too low. If the value is not exact, the {@link
       * ImmutableLongArray} that is built will very likely occupy more memory than strictly necessary;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 22.3K bytes
    - Viewed (0)
  10. guava/src/com/google/common/primitives/ImmutableIntArray.java

       *
       * <p><b>Performance note:</b> When feasible, {@code initialCapacity} should be the exact number
       * of values that will be added, if that knowledge is readily available. It is better to guess a
       * value slightly too high than slightly too low. If the value is not exact, the {@link
       * ImmutableIntArray} that is built will very likely occupy more memory than strictly necessary;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 21.4K bytes
    - Viewed (0)
Back to top