Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1211 - 1220 of 1,442 for examples (0.06 sec)

  1. src/main/java/jcifs/smb1/smb1/ACE.java

     * more ACEs are evaluated until all desired access bits (combined)
     * are "allowed". If all of the desired access bits are not "allowed"
     * the then same process is repeated for inherited ACEs.
     * <p>
     * For example, if user <code>WNET\alice</code> tries to open a file
     * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA |
     * FILE_WRITE_DATA</code>) and the target file has the following security
     * descriptor ACEs:
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  2. guava/src/com/google/common/base/Stopwatch.java

     *       in any other way than how {@code Stopwatch} uses them.
     *   <li>An alternative source of nanosecond ticks can be substituted, for example for testing or
     *       performance reasons, without affecting most of your code.
     * </ul>
     *
     * <p>The one downside of {@code Stopwatch} relative to {@link System#nanoTime()} is that {@code
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Oct 08 18:55:33 UTC 2025
    - 9.2K bytes
    - Viewed (0)
  3. internal/lock/lock_windows.go

    // path when needed, in order to avoid the default 260 character file
    // path limit imposed by Windows. If path is not easily converted to
    // the extended-length form (for example, if path is a relative path
    // or contains .. elements), or is short enough, fixLongPath returns
    // path unmodified.
    //
    // See https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247(v=vs.85).aspx#maxpath
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  4. android/guava-tests/test/com/google/common/hash/HashTestUtils.java

       * 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output
       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
       * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Oct 28 18:19:59 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  5. src/main/java/org/codelibs/core/io/FileUtil.java

         * preventing access to files outside the intended directory through path traversal
         * techniques like "../../../etc/passwd".
         * </p>
         * <p>
         * Example usage:
         * </p>
         * <pre>
         * Path baseDir = Paths.get("/var/app/data");
         * Path userPath = Paths.get(userInput);
         * if (!FileUtil.isPathSafe(userPath, baseDir)) {
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Sat Nov 22 11:21:59 UTC 2025
    - 13.1K bytes
    - Viewed (0)
  6. LICENSES/third_party/forked/shell2junit/LICENSE

    "Work" shall mean the work of authorship, whether in Source or Object form, 
    made available under the License, as indicated by a copyright notice that is 
    included in or attached to the work (an example is provided in the Appendix 
    below). 
    
    "Derivative Works" shall mean any work, whether in Source or Object form, 
    that is based on (or derived from) the Work and for which the editorial 
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Thu Jul 08 11:48:19 UTC 2021
    - 9.2K bytes
    - Viewed (0)
  7. src/test/java/jcifs/smb/Kerb5ContextTest.java

            lenient().when(gssManager.createContext(any(), any(), any(), anyInt())).thenReturn(gssContext);
    
            // Create Kerb5Context with mocked dependencies
            ctx = new Kerb5Context("host.example", "cifs", null, 0, 0, null);
        }
    
        @AfterEach
        void tearDown() {
            if (mockedStatic != null) {
                mockedStatic.close();
            }
        }
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  8. CREDITS

          "Work" shall mean the work of authorship, whether in Source or
          Object form, made available under the License, as indicated by a
          copyright notice that is included in or attached to the work
          (an example is provided in the Appendix below).
    
          "Derivative Works" shall mean any work, whether in Source or Object
          form, that is based on (or derived from) the Work and for which the
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
  9. guava/src/com/google/common/math/LongMath.java

         *
         * The key idea is that based on the number of leading zeros (equivalently, floor(log2(x))), we
         * can narrow the possible floor(log10(x)) values to two. For example, if floor(log2(x)) is 6,
         * then 64 <= x < 128, so floor(log10(x)) is either 1 or 2.
         */
        int y = maxLog10ForLeadingZeros[Long.numberOfLeadingZeros(x)];
        /*
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Nov 03 21:01:09 UTC 2025
    - 46.8K bytes
    - Viewed (0)
  10. guava/src/com/google/common/collect/CompactHashMap.java

      //
      // The `table` array always has a size that is a power of 2. The hashcode of a key in the map
      // is masked in order to correspond to the current table size. For example, if the table size
      // is 128 then the mask is 127 == 0x7f, keeping the bottom 7 bits of the hash value.
      // If a key hashes to 0x89abcdef the mask reduces it to 0x89abcdef & 0x7f == 0x6f. We'll call this
      // the "short hash".
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 39.6K bytes
    - Viewed (0)
Back to top