- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for recommended (0.22 sec)
-
src/main/java/jcifs/smb1/smb1/ACE.java
* To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Fri Mar 22 21:10:40 GMT 2019 - 7.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/es/client/SearchEngineClient.java
final int port = runner.node().settings().getAsInt("http.port", 9200); httpAddress = "http://localhost:" + port; logger.warn("Embedded OpenSearch is running. This configuration is not recommended for production use."); break; } } client = createHttpClient(fessConfig, httpAddress); if (StringUtil.isNotBlank(httpAddress)) {
Java - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Feb 22 01:37:57 GMT 2024 - 84.1K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 5.4K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 6.5K bytes - Viewed (0)