Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
| Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
What's a 'bikeshed'?
Can you uninstall an older version of Merge before installing a newer version or build?
What Problem Management tools are available?
Does QVCS integrate with any IDE?
What is subversion?
What is the recommended way to use three-way file merging?
What are the system requirements for Merge?
What role do you see for the use of authentication processes such as digital signatures in helping to maintain version control?
How to move a CS-RCS project to CS-CVS?
What is eSvn?
How to submit a patch for Subversion?
What is the "best" CM tool to use?
Is there a separate QVCS API library available for embedding version control into a non-QVCS application?
What is "version control"?
Can we use Merge to compare and synchronize local files with those on a web or FTP site?