Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for recommended (0.17 sec)

  1. src/main/java/jcifs/smb1/smb1/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Fri Mar 22 21:10:40 GMT 2019
    - 7.2K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/es/client/SearchEngineClient.java

                    final int port = runner.node().settings().getAsInt("http.port", 9200);
                    httpAddress = "http://localhost:" + port;
                    logger.warn("Embedded OpenSearch is running. This configuration is not recommended for production use.");
                    break;
                }
            }
            client = createHttpClient(fessConfig, httpAddress);
    
            if (StringUtil.isNotBlank(httpAddress)) {
    Java
    - Registered: Mon May 06 08:04:11 GMT 2024
    - Last Modified: Thu Feb 22 01:37:57 GMT 2024
    - 84.1K bytes
    - Viewed (0)
  3. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Plain Text
    - Registered: Mon May 06 08:04:11 GMT 2024
    - Last Modified: Tue May 08 21:35:34 GMT 2018
    - 11.1K bytes
    - Viewed (0)
  4. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Plain Text
    - Registered: Thu May 09 15:34:10 GMT 2024
    - Last Modified: Thu Jun 14 07:45:22 GMT 2018
    - 11.1K bytes
    - Viewed (0)
  5. LICENSE

                         END OF TERMS AND CONDITIONS
    
               How to Apply These Terms to Your New Libraries
    
      If you develop a new library, and you want it to be of the greatest
    possible use to the public, we recommend making it free software that
    everyone can redistribute and change.  You can do so by permitting
    redistribution under these terms (or, alternatively, under the terms of the
    ordinary General Public License).
    
    Plain Text
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Mon Jan 18 20:25:38 GMT 2016
    - 25.8K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/dtyp/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Sun Jul 01 13:12:10 GMT 2018
    - 5.4K bytes
    - Viewed (0)
  7. src/main/java/jcifs/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Sun Jul 01 13:12:10 GMT 2018
    - 6.5K bytes
    - Viewed (0)
Back to top