- Sort Score
- Num 10 results
- Language All
Results 271 - 280 of 337 for insecure (0.1 seconds)
-
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/util/GsaConfigParser.java
*/ public GsaConfigParser() { super(); } /** * Parses a GSA configuration XML file from the given input source. * This method configures a secure SAX parser and processes the XML content * to extract configuration information for web and file crawling. * * @param is the input source containing the GSA configuration XMLCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 21.6K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/Smb2SigningDigestTest.java
assertFalse(isValid, "Different session keys should fail verification"); } } @Nested @DisplayName("Secure Key Wiping Tests") class SecureKeyWipingTests { @Test @DisplayName("Should securely wipe signing key") void testSecureWipeKey() throws GeneralSecurityException {Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 43.7K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/filter/LoadControlFilterTest.java
@Override public java.util.Enumeration<java.util.Locale> getLocales() { return java.util.Collections.emptyEnumeration(); } @Override public boolean isSecure() { return false; } @Override public jakarta.servlet.RequestDispatcher getRequestDispatcher(String path) { return null; } @OverrideCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 21 06:04:58 GMT 2026 - 33.6K bytes - Click Count (0) -
docs/config/README.md
### Certificate Directory TLS certificates by default are expected to be stored under ``${HOME}/.minio/certs`` directory. You need to place certificates here to enable `HTTPS` based access. Read more about [How to secure access to MinIO server with TLS](https://docs.min.io/community/minio-object-store/operations/network-encryption.html). Following is a sample directory structure for MinIO server with TLS certificates. ```shCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 18.1K bytes - Click Count (1) -
android/guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
src/test/java/jcifs/config/DelegatingConfigurationTest.java
boolean dfsStrictView = delegatingConfig.isDfsStrictView(); // Then assertTrue(smb2Only, "Should delegate SMB2 only negotiation"); assertFalse(secureNegotiate, "Should delegate secure negotiate requirement"); assertTrue(ntlmTargetName, "Should delegate NTLM target name setting"); assertFalse(port139Failover, "Should delegate port 139 failover setting");
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 20.7K bytes - Click Count (0) -
cmd/site-replication.go
if target.SourceBucket == bucket && target.TargetBucket == bucket && target.Endpoint == prevEp.Host && target.Secure == (prevEp.Scheme == "https") && target.Type == madmin.ReplicationService { bucketTarget := target bucketTarget.Secure = ep.Scheme == "https" bucketTarget.Endpoint = ep.Host if peer.DefaultBandwidth.IsSet && target.BandwidthLimit == 0 {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 184.8K bytes - Click Count (1) -
apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt
for claims brought by any other entity based on infringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is Recipient's responsibility to acquire that license before
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Mon Sep 17 05:50:12 GMT 2018 - 11.1K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/EventListener.kt
* * proxy selection ([proxySelectStart], [proxySelectEnd]) * * dns ([dnsStart], [dnsEnd]) * * connect ([connectStart], [connectEnd], [connectFailed]) * * secure connect ([secureConnectStart], [secureConnectEnd]) * * connection held ([connectionAcquired], [connectionReleased]) * * request ([requestFailed]) * * headers ([requestHeadersStart], [requestHeadersEnd])
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Oct 07 21:03:04 GMT 2025 - 24.9K bytes - Click Count (0)