- Sort Score
- Result 10 results
- Languages All
Results 831 - 840 of 1,219 for Examples (0.04 sec)
-
cmd/signature-v4-utils_test.go
} initAllSubsystems(ctx) initConfigSubsystem(ctx, objLayer) globalIAMSys.Init(ctx, objLayer, globalEtcdClient, 2*time.Second) req, err := newTestRequest(http.MethodGet, "http://example.com:9000/bucket/object", 0, nil) if err != nil { t.Fatal(err) } if err = signRequestV4(req, globalActiveCred.AccessKey, globalActiveCred.SecretKey); err != nil { t.Fatal(err) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 14.3K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/client/smb1/SmbClient.java
* </p> * * <p> * The class uses JCIFS properties to configure the SMB connection. * </p> * * <p> * Usage example: * </p> * * <pre> * {@code * SmbClient smbClient = new SmbClient(); * smbClient.init(); * ResponseData responseData = smbClient.doGet("smb1://example.com/share/file.txt"); * // Process the responseData * smbClient.close(); * } * </pre> * */
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Sep 18 09:30:45 UTC 2025 - 23K bytes - Viewed (0) -
docs/compression/README.md
Combining encryption and compression is not safe in all setups. This is particularly so if the compression ratio of your content reveals information about it. See [CRIME TLS](https://en.wikipedia.org/wiki/CRIME) as an example of this. Therefore, compression is disabled when encrypting by default, and must be enabled separately. Consult our security experts on [SUBNET](https://min.io/pricing) to help you evaluate if
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 5.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
<img src="/img/tutorial/security/image12.png"> ## Check the username { #check-the-username } Here's a more complete example. Use a dependency to check if the username and password are correct.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
src/test/java/jcifs/util/StringsTest.java
"'smb2://admin:admin123@192.168.1.1/folder', 'smb2://admin:******@192.168.1.1/folder'", "'smbs://test:p@ssw0rd@example.com/share', 'smbs://test:******@example.com/share'" }) void testMaskSecretValueWithCredentials(String input, String expected) { // When String result = Strings.maskSecretValue(input); // Then
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.6K bytes - Viewed (0) -
guava/src/com/google/common/base/Predicates.java
* * <p><b>Warning:</b> contrary to the typical assumptions about predicates (as documented at * {@link Predicate#apply}), the returned predicate may not be <i>consistent with equals</i>. For * example, {@code instanceOf(ArrayList.class)} will yield different results for the two equal * instances {@code Lists.newArrayList(1)} and {@code Arrays.asList(1)}. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 26.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbTransport.java
return super.toString() + "[" + address + ":" + port + "]"; } /* DFS */ /* Split DFS path like \fs1.example.com\root5\link2\foo\bar.txt into at * most 3 components (not including the first index which is always empty): * result[0] = "" * result[1] = "fs1.example.com" * result[2] = "root5" * result[3] = "link2\foo\bar.txt" */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 31.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA | * FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: *
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
docs/security/tls_configuration_history.md
<a name="http2_naughty"></a> #### ² HTTP/2 Cipher Suite Denylist Cipher suites that are [discouraged for use][http2_denylist] with HTTP/2. OkHttp includes them because better suites are not commonly available. For example, none of the better cipher suites listed above shipped with Android 4.4 or Java 7. [OkHttp30]: https://square.github.io/okhttp/changelog_3x/#version-300 [OkHttp310]: https://square.github.io/okhttp/changelog_3x/#version-310
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 16:35:36 UTC 2022 - 9K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/primitives/FloatArrayAsListTest.java
return result; } public abstract static class TestFloatListGenerator implements TestListGenerator<Float> { @Override public SampleElements<Float> samples() { return new SampleFloats(); } @Override public List<Float> create(Object... elements) { Float[] array = new Float[elements.length]; int i = 0;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 5.6K bytes - Viewed (0)