Umask

Results: 34



#Item
11System software / Security / Access control / Computer security / Unix security / Umask / Filesystem permissions / Computing / Unix

Jan 11, 2012 Informix Database Permissions Setup The Fitrix Informix databases can be secured to allow access to tables for read permissions only. This is useful when you have configured ODBC connections for external ap

Add to Reading List

Source URL: www.fitrix.com

Language: English - Date: 2012-01-17 16:20:04
12Filesystem permissions / Computer security / Internet privacy / Social networking service / Facebook features / Rm / Umask / Chmod / Computing / Security / Access control

Cognitive disconnect: Understanding Facebook Connect login permissions WORKING DRAFT Nicky Robinson Joseph Bonneau

Add to Reading List

Source URL: jbonneau.com

Language: English - Date: 2014-06-09 19:21:34
13C POSIX library / Perl / Open / Umask / Computer file / Computing / Software engineering / Software

Perl versiondocumentation - SDBM_File NAME SDBM_File - Tied access to sdbm files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:23:22
14Ndbm / Search algorithms / Structured storage / Perl / Umask / Hash function / Dbm / Open / Autovivification / Computing / Software engineering / Software

Perl versiondocumentation - NDBM_File NAME NDBM_File - Tied access to ndbm files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:07:04
15Threads / Concurrency control / Parallel computing / Scheduling / Continuations / Multithreading / Umask / Call-with-current-continuation / Lock / Computing / Concurrent computing / Software engineering

Processes vs. User-Level Threads in Scsh Martin Gasbichler Michael Sperber ¨ Tubingen

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:05:28
16Chmod / Rm / Filesystem permissions / Cp / Cd / Find / Path / File system / Umask / Computing / Software / Unix

Perl versiondocumentation - File::Path NAME File::Path - Create or remove directory trees VERSION

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:22:48
17Mac OS X / Filesystem permissions / Repair permissions / Umask / Access control list / Finder / Install / Superuser / Home directory / Software / Computing / System software

Take Control of Permissions in Leopard[removed]SAMPLE

Add to Reading List

Source URL: www.takecontrolbooks.com

Language: English - Date: 2009-01-20 10:50:11
18Software / Setuid / Umask / User identifier / Environment variable / PATH / Group identifier / Chroot / Id / Computing / Unix / System software

How To Write a Setuid Program Matt Bishop Research Institute for Advanced Computer Science NASA Ames Research Center Moffett Field, CA 94035

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-03-12 20:42:02
19Cross-platform software / Installation software / Apache HTTP Server / Reverse proxy / Installer / SuEXEC / SYS / Form / Umask / Software / System software / Computing

dotDefender v5.12 for Apache Upgrade Guide Applicure Web Application Firewall

Add to Reading List

Source URL: www.applicure.com

Language: English - Date: 2013-10-08 11:31:05
20Computing / Keychain / System Preferences / FileVault / Finder / Mac OS 9 / Filesystem permissions / Umask / Mac OS / Software / Mac OS X / System software

UNCLASSIFIED Report Number:I331-009R-2004 Apple Mac OS X v10.3.x “Panther” Security Configuration Guide

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2008-03-18 01:55:23
UPDATE