-
### What do you want and why?
for streamers, blitz logs expose sensitive data by default on the terminal
### Possible implementation(s)
```
// Note: This stays in the /pages folder for the t…
-
hydra-ic
time=2022-03-30T10:18:03Z level=info msg=completed handling request http_request=map[headers: map[accept: application/json authorization: Value is sensitive and has been redacted. To see t…
-
### Page URL
https://docs.netapp.com/us-en/ontap-restapi-96/ontap/post-name-services-ldap.html
### Page title
Create an LDAP configuration for an SVM
### Summary
On the top of the page: The LDAP …
-
### What is the problem this feature will solve?
I am already running cloudfront in our production environment and our domain is connected.
When creating a new cloudfront distribution and connecting…
-
### Description
When deploying a lambda with TF, if you do not do something about hashing the file, changes are not noticed. And as such, it is very misleading if you haven't done this a lot. This is…
-
## Description
We're excited about the possibility of applying the new ECA framework to other use cases. We need to understand the types of scenarios which are reasonable for this framework and the …
-
So that you can't just use those IDs to find the list of banned content and be evil with it.
-
### Preflight Checklist
- [X] I have installed the [latest version of Storage Explorer](https://github.com/Microsoft/AzureStorageExplorer/releases/latest).
- [X] I have checked existing resources, in…
-
[Principled parsing for indentation-sensitive languages](https://dl.acm.org/doi/10.1145/2429069.2429129) [[pdf](https://michaeldadams.org/papers/layout_parsing/LayoutParsing.pdf)] lays out a way for e…
-
original issue:
> title: is this project aiming at replace gnome-keyring?
> I couldn't find the right place to discuss these questions, so I'm posting them here in hopes of getting some answers …