Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 71 - 80 of 664 for forget (0.04 seconds)

  1. docs/uk/docs/advanced/strict-content-type.md

    ## Ризик CSRF { #csrf-risk }
    
    Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії.
    
    Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:25:54 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  2. docs/de/docs/advanced/strict-content-type.md

    ## CSRF-Risiko { #csrf-risk }
    
    Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario.
    
    Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  3. android/guava/src/com/google/common/graph/Traverser.java

       * node(s) to any node reachable from the start node(s), and has no paths from any start node to
       * any other start node, such as a tree or forest.
       *
       * <p>{@code forTree()} is especially useful (versus {@code forGraph()}) in cases where the data
       * structure being traversed is, in addition to being a tree/forest, also defined <a
       * href="https://github.com/google/guava/wiki/GraphsExplained#non-recursiveness">recursively</a>.
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Wed Mar 11 01:10:31 GMT 2026
    - 19.3K bytes
    - Click Count (0)
  4. docs/en/docs/advanced/strict-content-type.md

    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  5. docs/pt/docs/advanced/strict-content-type.md

    ## Risco de CSRF { #csrf-risk }
    
    Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico.
    
    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  6. build-logic/build-update-utils/src/main/kotlin/gradlebuild.root-target-runtimes.gradle.kts

        description = "All dependencies which should run in a Gradle context, and therefore must declare or inherit target runtime compatibility"
    }
    
    // Computes a map of all projects in the full Gradle distribution to their target runtime details file.
    val targetRuntimeDetails: Provider<Map<String, File>> = configurations.resolvable("fullDistributionRuntimeClasspath") {
        extendsFrom(runtimeAware)
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Wed Mar 11 22:40:18 GMT 2026
    - 2.2K bytes
    - Click Count (0)
  7. cmd/xl-storage-format-v2-legacy.go

    			}
    		}
    		if val, ok := j.DeleteMarker.MetaSys[ReservedMetadataPrefixLower+ReplicaTimestamp]; ok {
    			tm, err := time.Parse(time.RFC3339Nano, string(val))
    			if err == nil {
    				j.DeleteMarker.MetaSys[ReservedMetadataPrefixLower+ReplicaTimestamp] = []byte(tm.UTC().Format(time.RFC3339Nano))
    			}
    		}
    	}
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 5.8K bytes
    - Click Count (0)
  8. docs/fr/docs/advanced/strict-content-type.md

    ## Risque CSRF { #csrf-risk }
    
    Ce comportement par défaut offre une protection contre une catégorie d’attaques de Cross-Site Request Forgery (CSRF) dans un scénario très spécifique.
    
    Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils :
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:33:45 GMT 2026
    - 3.9K bytes
    - Click Count (0)
  9. docs/zh-hant/docs/tutorial/testing.md

    ```console
    $ pytest
    
    ================ test session starts ================
    platform linux -- Python 3.6.9, pytest-5.3.5, py-1.8.1, pluggy-0.13.1
    rootdir: /home/user/code/superawesome-cli/app
    plugins: forked-1.1.3, xdist-1.31.0, cov-2.8.1
    collected 6 items
    
    ---> 100%
    
    test_main.py <span style="color: green; white-space: pre;">......                            [100%]</span>
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 17:05:38 GMT 2026
    - 5.6K bytes
    - Click Count (0)
  10. docs/zh/docs/tutorial/testing.md

    ```console
    $ pytest
    
    ================ test session starts ================
    platform linux -- Python 3.6.9, pytest-5.3.5, py-1.8.1, pluggy-0.13.1
    rootdir: /home/user/code/superawesome-cli/app
    plugins: forked-1.1.3, xdist-1.31.0, cov-2.8.1
    collected 6 items
    
    ---> 100%
    
    test_main.py <span style="color: green; white-space: pre;">......                            [100%]</span>
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 17:06:37 GMT 2026
    - 5.4K bytes
    - Click Count (0)
Back to Top