- Sort Score
- Result 10 results
- Languages All
Results 361 - 370 of 433 for hasTest (3.75 sec)
-
src/main/java/jcifs/smb/SmbTransportImpl.java
if (targetDomain != null) { targetDomain = targetDomain.toUpperCase(Locale.ROOT); } ListIterator<SmbSessionImpl> iter = this.sessions.listIterator(); while (iter.hasNext()) { final SmbSessionImpl ssn = iter.next(); if (ssn.matches(tf, targetHost, targetDomain)) { if (log.isTraceEnabled()) {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 69.8K bytes - Viewed (0) -
docs/en/docs/alternatives.md
/// /// check | Inspired **FastAPI** to Find a way to have a crazy performance. That's why **FastAPI** is based on Starlette, as it is the fastest framework available (tested by third-party benchmarks). /// ### <a href="https://falconframework.org/" class="external-link" target="_blank">Falcon</a> { #falcon }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 23.6K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Sie können jedoch nicht vom Kauderwelsch zurück zum Passwort konvertieren. ##### Warum Passwort-Hashing verwenden? Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes. Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.7K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Pero no puedes convertir del galimatías al password. ##### Por qué usar hashing de passwords Si tu base de datos es robada, el ladrón no tendrá los passwords en texto plano de tus usuarios, solo los hashes. Entonces, el ladrón no podrá intentar usar esos mismos passwords en otro sistema (como muchos usuarios usan el mismo password en todas partes, esto sería peligroso).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/ppc64_p10.s
XXSPLTI32DX $1, $1234, VS3 // 05000000806204d2 XXSPLTIDP $12345678, VS4 // 050000bc8084614e XXSPLTIW $123456, VS3 // 050000018066e240 // ISA 3.1B HASHST R2, -8(R1) // 7fe115a5 HASHSTP R2, -8(R1) // 7fe11525 HASHCHK -8(R1), R2 // 7fe115e5 HASHCHKP -8(R1), R2 // 7fe11565
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Mar 23 20:52:57 UTC 2023 - 14.3K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/HashBiMap.java
} } @Override public boolean hasNext() { checkForComodification(); return index != ENDPOINT && remaining > 0; } @Override @ParametricNullness public T next() { if (!hasNext()) { throw new NoSuchElementException(); } T result = forEntry(index);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 36.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
But you cannot convert from the gibberish back to the password. ##### Why use password hashing { #why-use-password-hashing } If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous). {* ../../docs_src/security/tutorial003_an_py310.py hl[82:85] *}
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
guava-testlib/src/com/google/common/testing/FreshValueGenerator.java
import java.nio.charset.Charset; import java.util.ArrayList; import java.util.Arrays; import java.util.Collection; import java.util.Comparator; import java.util.Currency; import java.util.HashMap; import java.util.HashSet; import java.util.LinkedHashMap; import java.util.LinkedHashSet; import java.util.LinkedList; import java.util.List; import java.util.Locale; import java.util.Map; import java.util.NavigableMap;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 28.7K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/Graphs.java
import com.google.common.collect.Maps; import com.google.errorprone.annotations.CanIgnoreReturnValue; import java.util.ArrayDeque; import java.util.Collection; import java.util.Deque; import java.util.HashSet; import java.util.Iterator; import java.util.Map; import java.util.Objects; import java.util.Queue; import java.util.Set; import org.jspecify.annotations.Nullable; /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 01 00:26:14 UTC 2025 - 22.7K bytes - Viewed (0) -
guava/src/com/google/common/graph/Graphs.java
import com.google.common.collect.Maps; import com.google.errorprone.annotations.CanIgnoreReturnValue; import java.util.ArrayDeque; import java.util.Collection; import java.util.Deque; import java.util.HashSet; import java.util.Iterator; import java.util.Map; import java.util.Objects; import java.util.Optional; import java.util.Queue; import java.util.Set; import org.jspecify.annotations.Nullable; /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Aug 01 00:26:14 UTC 2025 - 23.3K bytes - Viewed (0)