Search Options

Results per page
Sort
Preferred Languages
Advance

Results 831 - 840 of 1,219 for Examples (0.04 sec)

  1. cmd/signature-v4-utils_test.go

    	}
    
    	initAllSubsystems(ctx)
    	initConfigSubsystem(ctx, objLayer)
    
    	globalIAMSys.Init(ctx, objLayer, globalEtcdClient, 2*time.Second)
    
    	req, err := newTestRequest(http.MethodGet, "http://example.com:9000/bucket/object", 0, nil)
    	if err != nil {
    		t.Fatal(err)
    	}
    
    	if err = signRequestV4(req, globalActiveCred.AccessKey, globalActiveCred.SecretKey); err != nil {
    		t.Fatal(err)
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  2. fess-crawler/src/main/java/org/codelibs/fess/crawler/client/smb1/SmbClient.java

     * </p>
     *
     * <p>
     * The class uses JCIFS properties to configure the SMB connection.
     * </p>
     *
     * <p>
     * Usage example:
     * </p>
     *
     * <pre>
     * {@code
     * SmbClient smbClient = new SmbClient();
     * smbClient.init();
     * ResponseData responseData = smbClient.doGet("smb1://example.com/share/file.txt");
     * // Process the responseData
     * smbClient.close();
     * }
     * </pre>
     *
     */
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Thu Sep 18 09:30:45 UTC 2025
    - 23K bytes
    - Viewed (0)
  3. docs/compression/README.md

    Combining encryption and compression is not safe in all setups.
    This is particularly so if the compression ratio of your content reveals information about it.
    See [CRIME TLS](https://en.wikipedia.org/wiki/CRIME) as an example of this.
    
    Therefore, compression is disabled when encrypting by default, and must be enabled separately.
    
    Consult our security experts on [SUBNET](https://min.io/pricing) to help you evaluate if
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/security/http-basic-auth.md

    <img src="/img/tutorial/security/image12.png">
    
    ## Check the username { #check-the-username }
    
    Here's a more complete example.
    
    Use a dependency to check if the username and password are correct.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  5. src/test/java/jcifs/util/StringsTest.java

                    "'smb2://admin:admin123@192.168.1.1/folder', 'smb2://admin:******@192.168.1.1/folder'",
                    "'smbs://test:p@ssw0rd@example.com/share', 'smbs://test:******@example.com/share'" })
            void testMaskSecretValueWithCredentials(String input, String expected) {
                // When
                String result = Strings.maskSecretValue(input);
    
                // Then
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  6. guava/src/com/google/common/base/Predicates.java

       *
       * <p><b>Warning:</b> contrary to the typical assumptions about predicates (as documented at
       * {@link Predicate#apply}), the returned predicate may not be <i>consistent with equals</i>. For
       * example, {@code instanceOf(ArrayList.class)} will yield different results for the two equal
       * instances {@code Lists.newArrayList(1)} and {@code Arrays.asList(1)}.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/smb1/SmbTransport.java

            return super.toString() + "[" + address + ":" + port + "]";
        }
    
        /* DFS */
    
        /* Split DFS path like \fs1.example.com\root5\link2\foo\bar.txt into at
         * most 3 components (not including the first index which is always empty):
         * result[0] = ""
         * result[1] = "fs1.example.com"
         * result[2] = "root5"
         * result[3] = "link2\foo\bar.txt"
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 31.8K bytes
    - Viewed (0)
  8. src/main/java/jcifs/internal/dtyp/ACE.java

     * more ACEs are evaluated until all desired access bits (combined)
     * are "allowed". If all of the desired access bits are not "allowed"
     * the then same process is repeated for inherited ACEs.
     * <p>
     * For example, if user <code>WNET\alice</code> tries to open a file
     * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA |
     * FILE_WRITE_DATA</code>) and the target file has the following security
     * descriptor ACEs:
     *
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  9. docs/security/tls_configuration_history.md

    <a name="http2_naughty"></a>
    #### ² HTTP/2 Cipher Suite Denylist
    
    Cipher suites that are [discouraged for use][http2_denylist] with HTTP/2. OkHttp includes them because better suites are not commonly available. For example, none of the better cipher suites listed above shipped with Android 4.4 or Java 7.
    
    [OkHttp30]: https://square.github.io/okhttp/changelog_3x/#version-300
    [OkHttp310]: https://square.github.io/okhttp/changelog_3x/#version-310
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sun Feb 06 16:35:36 UTC 2022
    - 9K bytes
    - Viewed (0)
  10. android/guava-tests/test/com/google/common/primitives/FloatArrayAsListTest.java

        return result;
      }
    
      public abstract static class TestFloatListGenerator implements TestListGenerator<Float> {
        @Override
        public SampleElements<Float> samples() {
          return new SampleFloats();
        }
    
        @Override
        public List<Float> create(Object... elements) {
          Float[] array = new Float[elements.length];
          int i = 0;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 5.6K bytes
    - Viewed (0)
Back to top