jimbobfellamelad
Technical User
I know in my experience, you usually arent allowed to access a network resource if someone else has already accessed it and if you are, you are only allowed to open a read only copy. Is this right? Also how does UNIX handle this problem?