| 1. | To make a link to the lockfile and use 来创建一个指向锁文件的链接,使用 |
| 2. | We ve examined how to create lock files correctly and alternatives 我们已经分析了如何正确地创建锁文件及其替代者。 |
| 3. | Alternatives to lock files 锁文件的代替者 |
| 4. | Make sure that only programs you can trust can add and remove these lock files 确保只有您可以信任的程序才能添加或者删除锁文件! |
| 5. | Lock _ ex an exclusive lock . this denies all other processes both read and write access to the file 排他锁。除加锁进程外其他进程没有对已加锁文件读写访问权限。 |
| 6. | In a similar vein , you should place lock files for things like device lock files in var lock 根据同样的思路,您应该将设备锁文件之类的锁文件放置在/ var / lock中。 |
| 7. | Used by the gac cache lock files and the security configuration caching mechanism of the common language runtime 由gac缓存锁文件和公共语言运行库的安全配置缓存机制使用。 |
| 8. | Create files this way , even if the lock file already exists - which means that the lock won t work correctly for root 可以这样创建文件,即便锁文件已经存在,这意味着该锁不能为root正常工作。 |
| 9. | Path name to the main storage file . the names for supplemental files , including index and lock files , will be computed from this 主存储文件的路径名。追加的文件名称,其中包括索引和锁文件,都是从这里计算的获得的。 |
| 10. | Take control of your sensitive information by keeping it away from prying eyes - only the correct password can unlock files you encrypt 采取控制你的敏感资料保存,它远离撬拨眼-只有正确的密码才能解锁文件,你加密。 |