Search Options

Results per page
Sort
Preferred Languages
Advance

Results 671 - 680 of 1,236 for Example (1.46 sec)

  1. docs/distributed/DECOMMISSION.md

    Decommissiong is a mechanism in MinIO to drain older pools (usually with old hardware) and migrate the content from such pools to a newer pools (usually better hardware). Decommissioning spreads the data across all pools - for example, if you decommission `pool1`, all the data from `pool1` spreads across `pool2` and `pool3`.
    
    ## Features
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Jul 11 14:59:49 UTC 2022
    - 8.3K bytes
    - Viewed (0)
  2. fess-crawler/src/main/java/org/codelibs/fess/crawler/client/smb1/SmbClient.java

     * </p>
     *
     * <p>
     * The class uses JCIFS properties to configure the SMB connection.
     * </p>
     *
     * <p>
     * Usage example:
     * </p>
     *
     * <pre>
     * {@code
     * SmbClient smbClient = new SmbClient();
     * smbClient.init();
     * ResponseData responseData = smbClient.doGet("smb1://example.com/share/file.txt");
     * // Process the responseData
     * smbClient.close();
     * }
     * </pre>
     *
     */
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Thu Sep 18 09:30:45 UTC 2025
    - 23K bytes
    - Viewed (0)
  3. docs/compression/README.md

    Combining encryption and compression is not safe in all setups.
    This is particularly so if the compression ratio of your content reveals information about it.
    See [CRIME TLS](https://en.wikipedia.org/wiki/CRIME) as an example of this.
    
    Therefore, compression is disabled when encrypting by default, and must be enabled separately.
    
    Consult our security experts on [SUBNET](https://min.io/pricing) to help you evaluate if
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/security/http-basic-auth.md

    <img src="/img/tutorial/security/image12.png">
    
    ## Check the username { #check-the-username }
    
    Here's a more complete example.
    
    Use a dependency to check if the username and password are correct.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  5. src/test/java/jcifs/util/StringsTest.java

                    "'smb2://admin:admin123@192.168.1.1/folder', 'smb2://admin:******@192.168.1.1/folder'",
                    "'smbs://test:p@ssw0rd@example.com/share', 'smbs://test:******@example.com/share'" })
            void testMaskSecretValueWithCredentials(String input, String expected) {
                // When
                String result = Strings.maskSecretValue(input);
    
                // Then
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/net/InetAddresses.java

      /**
       * Returns the {@link InetAddress} having the given string representation.
       *
       * <p>This deliberately avoids all nameservice lookups (e.g. no DNS).
       *
       * <p>This method accepts non-ASCII digits, for example {@code "192.168.0.1"} (those are fullwidth
       * characters). That is consistent with {@link InetAddress}, but not with various RFCs. If you
       * want to accept ASCII digits only, you can use something like {@code
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  7. docs/security/tls_configuration_history.md

    <a name="http2_naughty"></a>
    #### ² HTTP/2 Cipher Suite Denylist
    
    Cipher suites that are [discouraged for use][http2_denylist] with HTTP/2. OkHttp includes them because better suites are not commonly available. For example, none of the better cipher suites listed above shipped with Android 4.4 or Java 7.
    
    [OkHttp30]: https://square.github.io/okhttp/changelog_3x/#version-300
    [OkHttp310]: https://square.github.io/okhttp/changelog_3x/#version-310
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sun Feb 06 16:35:36 UTC 2022
    - 9K bytes
    - Viewed (0)
  8. guava/src/com/google/common/util/concurrent/NullnessCasts.java

       * never use this method, preferring instead to call {@code requireNonNull} so as to benefit from
       * its runtime check.
       *
       * <p>An example use case for this method is in implementing an {@code Iterator<T>} whose {@code
       * next} field is lazily initialized. The type of that field would be {@code @Nullable T}, and the
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 13 20:49:47 UTC 2025
    - 4K bytes
    - Viewed (0)
  9. src/main/java/jcifs/internal/dtyp/ACE.java

     * more ACEs are evaluated until all desired access bits (combined)
     * are "allowed". If all of the desired access bits are not "allowed"
     * the then same process is repeated for inherited ACEs.
     * <p>
     * For example, if user <code>WNET\alice</code> tries to open a file
     * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA |
     * FILE_WRITE_DATA</code>) and the target file has the following security
     * descriptor ACEs:
     *
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  10. guava/src/com/google/common/base/Predicates.java

       *
       * <p><b>Warning:</b> contrary to the typical assumptions about predicates (as documented at
       * {@link Predicate#apply}), the returned predicate may not be <i>consistent with equals</i>. For
       * example, {@code instanceOf(ArrayList.class)} will yield different results for the two equal
       * instances {@code Lists.newArrayList(1)} and {@code Arrays.asList(1)}.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
Back to top