| 1. | You ll find a good example of using acls on the 上使您自己熟悉访问控制表。您将在 |
| 2. | Access control lists let you define fine - grained permissions for files 访问控制表让您定义细粒度的文件许可权。 |
| 3. | And design the acl valid check algorithm and acl access check algorithm 设计了访问控制表有效性判断策略和访问控制规则检查策略。 |
| 4. | The next incredibly cool samba 2 . 2 feature is its new support for access control lists , or acls Samba 2 . 2另一个不可思议的绝妙特性是对访问控制表( acl )的新支持。 |
| 5. | Full coverage of access control lists is beyond the scope of this article , but you can find a great introduction to acls on the bestbits site see 全面讨论访问控制表超出了本文的范围,但是您可以在bestbits站点(请参阅 |
| 6. | One of these goodies is some special functionality called " access control lists " or acls , and is now enabled on xfs filesystems by default 其中之一是一些名为“访问控制表”或acl的特殊功能,现在在xfs文件系统上缺省启用这些功能。 |
| 7. | Third , presents a method to put acl on the abstract layer of extended attribute ( ea ) mechanism . the acls are passed in the ea system calls 三、对文件系统的扩展属性机制进行研究,并利用文件系统的扩展属性( ea )机制传递、存储和保护访问控制表。 |
| 8. | Securing web services with acls , however , does not mitigate the risk of exposing web services and non - web services vulnerabilities to a malicious attack 用访问控制表保护web服务,然而,这并不能减轻web服务(以及非web服务)漏洞受到恶意攻击的危险。 |
| 9. | Main achievements include : first , supporting the posix family of standards , the thesis adds two new acl entries in to access control list for global uses 在遵循posix1003 . 1e标准的基础上,扩展了访问控制表语法规则,增加了用于全局设置的访问控制表规则项。 |
| 10. | I ll guide you through the process of setting up xfs on your own system , as well as cover xfs tuning tips and useful xfs features like acl access control lists and extended attribute support 中,我将全程指导您在自己的系统上设置xfs ,并讲述了xfs调优技巧和诸如acl (访问控制表)及扩展属性支持之类有用的xfs特性。 |