8.6K results in 36 ms
6 years ago · Mar 02, 2019, 11:16 PM
see me"); UserInput = in.nextLine(); } SecretKey Destination_Key = desKeyGen(); byte[] encryptedMessage
6 years ago · Mar 02, 2019, 04:26 PM
SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256"); KeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt.getBytes(), 65536, 128); SecretKey tmp = secretKeyFactory.generateSecret(keySpec); secretKey = new SecretKeySpec(tmp.getEncoded(), "AES"); cipher = Cipher.getInstance("AES/CBC/PKCS7Padding");
6 years ago · Mar 02, 2019, 04:14 PM
s3 = boto3.resource('s3') ACCESS_KEY= 'xxxx' SECRET_KEY= 'xxxx' session = boto3.Session( aws_access_key_id=ACCESS_KEY,
6 years ago · Mar 02, 2019, 02:12 PM
var send = function() { requestify.post('https://'+config.domain+'/api/userqueue', { secretKey: config.secretKey, action: 'queueUser', id:
6 years ago · Mar 02, 2019, 11:30 AM
as config ACCESS_KEY = "" #config.aws_keys['access_key_id'] SECRET_KEY = "" #config.aws_keys['secret_access_key'] BUCKET_NAME = "polysemy-embedding-sutha" #config.bucket_name
6 years ago · Mar 02, 2019, 02:40 AM
DEBUG = True SECRET_KEY = '76CB9446-583C-4359-94D1-A2631912FFCC' SERVER_NAME = 'localhost:9000' # Flask-Mail.
6 years ago · Mar 01, 2019, 05:14 PM
in __init__ raise ImproperlyConfigured("The SECRET_KEY setting must not be
6 years ago · Mar 01, 2019, 05:08 PM
local-address=0.0.0.0 passive=no port=500 auth-method=pre-shared-key secret="KEY" generate-policy=no policy-template-group=default exchange-mode=main send-initial-contact=yes
6 years ago · Mar 01, 2019, 02:36 PM
ROSETTA_SHOW_AT_ADMIN_PANEL = True ROSETTA_STORAGE_CLASS = 'rosetta.storage.CacheRosettaStorage' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Mar 01, 2019, 09:56 AM
ROSETTA_SHOW_AT_ADMIN_PANEL = True ROSETTA_STORAGE_CLASS = 'rosetta.storage.CacheRosettaStorage' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Mar 01, 2019, 09:28 AM
ROOT_URLCONF = 'career_support_api.urls' SCHOOL_PORTAL_URL = 'http://localhost:8000' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Mar 01, 2019, 09:06 AM
ROOT_URLCONF = 'career_support_api.urls' SCHOOL_PORTAL_URL = 'http://localhost:8000' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Mar 01, 2019, 02:18 AM
Base64.encode64(encrypted) end $CREDENTIALS = 'user:pass'; $SECRET_KEY = 'xxxx'; //40 character secret
6 years ago · Feb 28, 2019, 08:32 PM
5 ! crypto isakmp key secretkey address 20.0.0.1 ! ! crypto ipsec
6 years ago · Feb 28, 2019, 06:48 PM
is the secret"); byte[] secretKey = decAESsessionCipher.doFinal(secret); System.out.println(new String(secretKey)); } catch
6 years ago · Feb 28, 2019, 05:44 PM
static void InitRC4Encryption + (uint8_t * secretKey, + uint8_t * pubKeyIn, +@@ -1067,7 +1070,9
6 years ago · Feb 28, 2019, 04:58 PM
public static async Task<string> GetAccessToken(string azureTenantId, string azureAppId, string azureSecretKey) { var context = new AuthenticationContext(ConfigurationManager.AppSettings.Get("Authority") + tenantId); ClientCredential clientCredential = new ClientCredential(appId, secretKey); var tokenResponse = await context.AcquireTokenAsync(ConfigurationManager.AppSettings.Get("VaultUrl"), clientCredential); var accessToken = tokenResponse.AccessToken; return accessToken; }
6 years ago · Feb 28, 2019, 07:18 AM
ISN = M + F(localip, localport, remoteip, remoteport, secretkey)
6 years ago · Feb 28, 2019, 04:36 AM
BaseUrl; client.Authenticator = new HttpBasicAuthenticator(_accountSid, _secretKey); request.AddParameter("AccountSid", _accountSid, ParameterType.UrlSegment); // used
Total pages: 429