Secret Strings/en
During execution, strings might be needed or generated which should not be shown in the activity log or in the final report. Examples for such are passwords as entered by the operator or cryptographic keys as used temporarily.
During execution, strings might be needed or generated which should not be shown in the activity log or in the final report. Examples for such are passwords as entered by the operator or cryptographic keys as used temporarily.
Copyright © 2014-2024 eXept Software AG