Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
| Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
What are all the HTTP methods Subversion uses?
What is the difference between configuration management tool and version control tool?
What is the difference between a Change and a Conflict?
What is subversion?
How to move a project created by another version-control tool to CS-CVS?
Explain impersonation?
Is there a version of Merge for Mac OS X?
What is the "best" CM tool to use?
What tools are used to develop QVCS?
Which versions of Merge are Year 2000 (Y2K) compliant?
When CS-CVS should be used?
How would you use Version Control on an entire sub-system? And why would this be useful?
What is the difference between the Standard and Professional Editions of Merge?
Tell me is version control more for software development or software maintenance?
What's the best way to find out more about the capabilities of QVCS?