/dports/devel/dbus/dbus-1.12.20/bus/ |
H A D | policy.c | 1108 dbus_bool_t eavesdropping; in bus_client_policy_check_can_receive() local 1110 eavesdropping = in bus_client_policy_check_can_receive() 1118 _dbus_verbose (" (policy) checking receive rules, eavesdropping = %d\n", eavesdropping); in bus_client_policy_check_can_receive() 1147 if (eavesdropping && rule->allow && !rule->d.receive.eavesdrop) in bus_client_policy_check_can_receive() 1156 if (!eavesdropping && !rule->allow && rule->d.receive.eavesdrop) in bus_client_policy_check_can_receive()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/mail/locales/en-US/messenger/otr/ |
H A D | otrUI.ftl | 42 finger-unseen = The identity of { $name } has not been verified yet. Casual eavesdropping is not po… 46 finger-seen = { $name } is contacting you from an unrecognized computer. Casual eavesdropping is no…
|
H A D | am-im-otr.ftl | 8 …ryption of one-to-one conversations. This prevents third parties from eavesdropping on a conversat…
|
/dports/net/kea/kea-2.0.1/doc/examples/https/shell/ |
H A D | kea-stunnel.conf | 12 ; (i.e. eavesdropping) and active (i.e. man-in-the-middle) attacks
|
/dports/sysutils/gksu/gksu-2.0.2/po/ |
H A D | ru.po | 181 "the eavesdropping of your password by a a malicious\n" 244 #~ "A malicious client may be eavesdropping\n" 254 #~ "A malicious client may be eavesdropping\n"
|
H A D | xh.po | 179 "the eavesdropping of your password by a a malicious\n" 243 #~ "A malicious client may be eavesdropping\n" 252 #~ "A malicious client may be eavesdropping\n"
|
H A D | pt.po | 177 "the eavesdropping of your password by a a malicious\n" 241 #~ "A malicious client may be eavesdropping\n" 250 #~ "A malicious client may be eavesdropping\n"
|
/dports/devel/mercurial/mercurial-6.0/tests/ |
H A D | test-https.t | 131 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering 167 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering 209 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering 234 …LIP is disabled per current settings; communication is susceptible to eavesdropping and tampering … 245 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering 402 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering 461 …lhost is disabled per current settings; communication is susceptible to eavesdropping and tampering
|
/dports/security/vault/vault-1.8.2/website/content/docs/internals/ |
H A D | security.mdx | 14 This means that data at rest and in transit must be secure from eavesdropping 25 should be secure from eavesdropping as well as communication from Vault to 39 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/helmfile/vault-f6547fa8e820/website/pages/docs/internals/ |
H A D | security.mdx | 15 This means that data at rest and in transit must be secure from eavesdropping 26 should be secure from eavesdropping as well as communication from Vault to 40 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/misc/concourse/vault-bdd38fca2cff/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/vault/vault-0.6.0/website/source/docs/internals/ |
H A D | security.html.md | 16 This means that data at rest and in transit must be secure from eavesdropping 27 should be secure from eavesdropping as well as communication from Vault to 41 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/libgksu/libgksu-2.0.12/po/ |
H A D | ko.po | 34 "A malicious client may be eavesdropping on your session or you may have just " 49 "A malicious client may be eavesdropping on your session or you may have just " 130 "the eavesdropping of your password by a a malicious\n"
|
H A D | th.po | 32 "A malicious client may be eavesdropping on your session or you may have just " 48 "A malicious client may be eavesdropping on your session or you may have just " 132 "the eavesdropping of your password by a a malicious\n"
|
H A D | zh_CN.po | 35 "A malicious client may be eavesdropping on your session or you may have just clicked a menu or som… 49 "A malicious client may be eavesdropping on your session or you may have just clicked a menu or som… 124 "the eavesdropping of your password by a a malicious\n"
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/istio/vault-sdk-v0.1.12/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/website/source/docs/internals/ |
H A D | security.html.md | 17 This means that data at rest and in transit must be secure from eavesdropping 28 should be secure from eavesdropping as well as communication from Vault to 42 storage backend must be safe from eavesdropping. In practice, this means all
|
/dports/devel/kio-extras/kio-extras-21.12.3/po/en_GB/ |
H A D | kio5_sftp.po | 401 #~ "Someone could be eavesdropping on your connection, or the administrator " 410 #~ "Someone could be eavesdropping on your connection, or the administrator " 420 #~ "Someone could be eavesdropping on your connection, or the administrator " 430 #~ "Someone could be eavesdropping on your connection, or the administrator "
|
/dports/print/latex2rtf/latex2rtf-2.3.17/test/ |
H A D | bib_apalike2.tex | 79 exempt from eavesdropping are those sent in real-time character for 83 eavesdropping, and no wiretap warrant is necessary if the 101 time between data entry and data transmission, eavesdropping does not
|