Search results
- ... for file I/O. There are different Object access types set for each particular object; security alarms and audit can be enabled to track access to ...1 KB (205 words) - 12:57, 28 March 2019
- ... that can be managed for protected objects of each class. class="wikitable" - Object class Access types - Capability Capabilities ...854 bytes (111 words) - 05:50, 23 August 2018
- '''OBJECT''' is a group of Privileges privileges that has potential to compromise ... the process from reading an object (such as UIC Protection or ...611 bytes (88 words) - 15:28, 1 April 2025
- ... the buffer will be the same as the length of item_value . ;parameters : il:object : item list : item:int : item to add : item_value:str : value to add ...37 KB (5,969 words) - 23:26, 6 July 2022
- ... the top of the ACL. - OSS$_ACL_READ Returns the portion of the object’s ACL to the buffer pointed to by the buffer address. - OSS$_ACL_READ ...13 KB (2,135 words) - 10:47, 3 February 2020
- ... or kernel mode or possess the AUDIT privilege. Usually, $CHKPRO generates an object access audit when an audit is required. The caller can specify the ...15 KB (2,536 words) - 09:56, 8 June 2019
- ... of the parent directory. SET SECURITY does not copy any ACE on the source object if the ACE holds the nopropagate attribute nor does it change any ACE ...8 KB (1,169 words) - 13:43, 3 December 2019
- ... fied in network proxy authorization file - NSA$C_MSG_OBJ_ACCESS Object access attempted - OBJ_ACCESS Access attempted to create, delete, or ...14 KB (2,109 words) - 02:26, 26 November 2021
- ... users, and to all other users. The system manager can protect system objects with access control lists (ACLs) that allow access to be granted or ...73 KB (10,966 words) - 01:24, 5 June 2022
- ... an aligned object. Since the compiler determines the alignment of the dereferenced object from the type of the pointer, and the program is allowed to ...19 KB (2,839 words) - 12:30, 19 September 2023
- ... ACE in the access control list (ACL) of an object. To audit all objects of a class, use the ACCESS keyword. - ALL Specifies all system events and ...8 KB (1,069 words) - 15:37, 11 December 2019
- ... an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. Users have no access to the subsystem ...6 KB (949 words) - 14:04, 4 December 2019
- ... Define the main target depending on the project type Define object dependencies '''NOTE''': For some languages the compilation order is important. ...8 KB (513 words) - 10:30, 20 August 2019
- '''Default protection''' is the security profile of an object that the object gets when it is created unless a different security profile is specified ...3 KB (392 words) - 05:59, 25 February 2019
- ... volumes Grant this privilege with extreme caution because it overrides all object protection. It should be reserved for use by well-tested, reliable ...3 KB (433 words) - 07:24, 28 February 2019
- ... audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to ...7 KB (876 words) - 13:49, 14 December 2021
- ... a remote node failed for one of the following reasons: The object requested does not exist. The access control information specified is invalid. ...122 KB (18,338 words) - 07:03, 23 December 2019
- ... The options include: DEBUG excludes local symbol table information in the object file for use with the debugger. If the /DEBUG qualifier is also ...4 KB (529 words) - 09:22, 8 February 2023
- ... that the process uses a vector instruction =Permanence of the object= The capability object's security profile needs to be reset each time the ...1 KB (232 words) - 05:55, 23 August 2018
- ... the table below). These flags are used to define the scope of the object search specified in the call to the $GETQUI system service. Note that the ...7 KB (1,022 words) - 15:35, 26 November 2019