Search results

Jump to: navigation, search
  • ... specifies the Account name account name used by the Accounting utility. If the user record is created in a new UIC group, that name is used as ...
    8 KB (1,100 words) - 14:43, 3 December 2019
  • ... Subprocess subprocess , and Batch Process batch users on the system. =Syntax= SHOW USERS username Qualifiers /BATCH /CLUSTER /EXACT ...
    467 bytes (56 words) - 11:12, 3 December 2019
  • ... record locks. For each lock found it displays the process ID, and name, the user name, terminal name and the name of the image being executed. It also ...
    228 KB (33,783 words) - 18:52, 12 July 2023
  • ... code (UIC). To log in and gain access to the system, the user must supply a valid user name and password. The password is encoded and does not appear ...
    73 KB (10,966 words) - 01:24, 5 June 2022
  • ... are limited in the extent to which they can modify the UAF records of users in the same group; values such as privileges and quotas can be changed ...
    24 KB (4,006 words) - 09:56, 8 June 2019
  • ... proxy in, the proxy database. =Syntax= SYS$ADD_PROXY rem_node ,rem_user ,local_user , flags C Prototype: int sys$add_proxy (void rem_node, void rem ...
    6 KB (972 words) - 13:31, 8 June 2019
  • ... of the $CRMPSC_ 64 system services for OpenVMS Alpha.) On OpenVMS VAX, user programs are limited to an architectural maximum of two billion bytes (the ...
    122 KB (18,338 words) - 07:03, 23 December 2019
  • ... forced to change the password after logging in. If the user does not select a new password, the user is locked out of the system. To use this feature ...
    7 KB (1,029 words) - 07:49, 13 December 2019
  • ... flags DISFORCE_PWD_CHANGE flag , because if you don’t, the first time the user logs in they will not be prompted to change their password and when ...
    7 KB (1,059 words) - 17:12, 17 May 2023
  • ... name or UIC. You can use the asterisk wildcard to specify multiple user names or UICs. Full use of the asterisk and percent wildcards is permitted ...
    6 KB (895 words) - 12:38, 28 November 2019
  • ... call to $GETJPI belongs. This limit is set in the UAF record of the user who owns the process. The number is returned as a word decimal value. A value ...
    49 KB (8,143 words) - 07:47, 14 November 2019
  • ... which may be used for purposes that do not disclose the code to the user, such as the process termination code supplied to $DELPRC (but not the image ...
    29 KB (4,677 words) - 11:15, 23 March 2022
  • ... again. Once the specified number of attempts has been made without success, the user loses the carrier. As long as neither LGI_BRK_LIM nor LGI_BRK ...
    4 KB (639 words) - 04:18, 23 August 2018
  • ... to objects belonging to the subsystem. Users have no access to the ... to the subsystem. Once in the subsystem, users can work with the data files and ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... file that you want to overwrite has not been reached. You must have the user privilege VOLPRO or your UIC must match the UIC written on the volume. ...
    18 KB (2,869 words) - 14:52, 2 December 2019
  • ... PUBLIC KEY ---- Save the Notepad session in the .ssh folder for the user as OpenVMS.PUB . Open a CMD prompt window on the Windows 10 system to ...
    9 KB (1,393 words) - 13:25, 29 June 2023
  • ... , as supplied to the $CREPRC system service. - NEW_OWNER Specifies the user identification code (UIC) to be assigned to the created process, as ...
    14 KB (2,109 words) - 02:26, 26 November 2021
  • ... the address of a descriptor pointing to a buffer that contains an encoded user security profile. The usrpro argument eliminates the need to supply all ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... ''ADD new-record''' is an alias for COPY DEFAULT new-record: it creates a new user record with all information from the default record except for the ...
    3 KB (401 words) - 08:09, 7 June 2021
  • ... ; bear in mind that numbers in a UIC are octal). If MAXSYSGROUP is set to 10, then a user with a UIC of 1,4 or 10,3 will belong to System, whereas ...
    2 KB (409 words) - 13:01, 14 March 2019
  • ... run SYS$MANAGER:APACHE$CONFIG.COM. This will result in the creation of the APACHE$WWW user account and set it as owner to all of Apache’s files. It ...
    50 KB (7,396 words) - 17:34, 26 January 2022
  • ... sure that the system parameters will allow the settings chosen for the Tomcat user account. The table below shows the quotas that will be used in the ...
    49 KB (7,079 words) - 07:13, 20 October 2021
  • ... using CREATE/PROXY. To add a proxy, use ADD/PROXY remote_node::remote_user local_user/default. You can add as many proxies on the same local account ...
    2 KB (361 words) - 07:10, 28 February 2019
  • ... to use the F$GETJPI function to return the user name for the process number 3B0018. The user name is assigned to the symbol NAME. $ X=F$ENVIRONMENT( ...
    22 KB (3,044 words) - 17:48, 28 June 2019
  • ... be stored. The buffer is the 32- or 64-bit address of this user buffer. buffer_size SyservArgument byte count longword (signed) read by value ...
    2 KB (372 words) - 12:48, 28 November 2019
  • ... authorization file (UAF) record for the specified user. ;parameters : user_name:str : name of the user whose UAF record is modified : item_list:object ...
    37 KB (5,969 words) - 23:26, 6 July 2022
  • ... style="text-align:center;" String TRUE or FALSE to indicate whether the user requested that the specified job be retained in the queue if the ...
    33 KB (5,271 words) - 09:44, 13 September 2018
  • ... list means no access, so when you omit an access type for a user category, that category of user is denied that type of access. To deny all access to ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... and groups are created automatically by the AUTHORIZE utility when a new user or group is added. Alternatively, you can use /VALUE=UIC with the ...
    1 KB (227 words) - 12:38, 28 November 2019
  • ... maintaining and enforcing limits on the amount of disk space available to users on a public volume. =Disk quotas= On each volume or volume set where ...
    2 KB (347 words) - 13:40, 10 November 2019
  • ... to specify that the current day is to be considered a Secondary day for user login purposes. $GETSYI returns the number 0 if any override with the SET ...
    54 KB (8,797 words) - 19:32, 13 November 2019
  • ... command. It shares resources with the parent process and terminates when the user logs out of that process or the command submitted to PIPE is ...
    7 KB (909 words) - 09:35, 17 February 2022
  • ... WRITE qualifier to open an existing file. While the file is open, no other user will have access to it. When the file is first opened, the pointer is ...
    3 KB (505 words) - 09:41, 2 December 2019
  • ... (LES) address for asynchronous transfer mode (ATM). Usually the address is not user specified, and this qualifier is used only if you want a specific ...
    38 KB (4,756 words) - 06:27, 14 March 2019
  • ... (LES) address for asynchronous transfer mode (ATM). Usually the address is not user specified, and this qualifier is used only if you want a specific ...
    38 KB (4,668 words) - 10:58, 22 March 2019
  • ... github.com/mscdex/ssh2/blob/master/util/pagent.exe If nothing is specified, user will be prompted to enter the password during the connection attempt. ...
    9 KB (1,092 words) - 09:28, 12 February 2024
  • ... string length is set to a maximum of 255 characters. Once this bit is set, user name length is set to maximum of 255 characters. Even if this bit is ...
    3 KB (556 words) - 04:58, 9 April 2019
  • ... Override the expiration date on a tape or disk volume owned by another user Use the /FOREIGN qualifier to mount a Files-11 volume owned by another ...
    2 KB (262 words) - 08:31, 17 July 2019
  • ... field, the system will look for a file called LOGIN.COM in the user's Default directory default directory and if found execute the latest version ...
    2 KB (262 words) - 12:18, 28 November 2019
  • ... DECUServe On-Line The legendary user group started in March ... - GUID Partition Table https://habr.com/users/coderush/posts/ Nikolay Shley's Blog ...
    25 KB (3,483 words) - 09:59, 29 August 2022
  • ... Set WSQUOTA at the largest number of pages required by a program that the user will run interactively. Set WSEXTENT at the largest number of pages you ...
    3 KB (498 words) - 05:59, 3 July 2019
  • ... may access group objects via system protection IMPERSONATE may impersonate another user IMPORT may set classification for unlabeled object LOG_IO may ...
    7 KB (876 words) - 13:49, 14 December 2021
  • ... that has never been written A disk volume that is owned by your current user identification code (UIC) or by the UIC 0,0 A magnetic tape volume ...
    24 KB (3,938 words) - 14:47, 2 December 2019
  • ... template is used. The logical access bit must be clear for the class of user requiring access to the mailbox. The access bit must be clear for all ...
    15 KB (2,430 words) - 12:45, 28 November 2019
  • ... style="text-align:center;" String TRUE or FALSE to indicate whether the user requested that the specified job be retained in the queue if the ...
    24 KB (3,615 words) - 12:25, 26 November 2019
  • ... service has returned information about all job entries for the specified user (or the current user name if the QUI$_SEARCH_USERNAME item code is not ...
    47 KB (7,858 words) - 12:47, 28 November 2019
  • ... Access Control Entry that controls the type of access allowed to a particular user or group of users. An example of an Identifier ACE is as follows ...
    3 KB (477 words) - 12:34, 28 November 2019
  • ... be shared and thus have concurrent users or be unshared and have a single ... '''LOG_IO''' privilege allows the user's process to execute the Queue I/O ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... Change Mode to Kernel ($CMKRNL) system service. Grant this privilege only to users who need to gain access to protected and sensitive data structures ...
    928 bytes (141 words) - 07:26, 28 February 2019
  • ... and SYSNAM can set the system time. Grant this privilege only to users who need to execute privileged instructions or who need to gain access ...
    2 KB (364 words) - 07:30, 28 February 2019
  • ... If this privilege is given to unqualified users who have no need for it, the ... the system device, the destruction of user data, and the exposure of ...
    2 KB (309 words) - 10:17, 2 March 2019
  • ... the log file of operators' messages. In addition, this privilege lets the user spool devices, create and control all queues, and modify the protection ...
    6 KB (963 words) - 11:28, 2 December 2019
  • ... the destruction of information on the system device, the destruction of user data, and the exposure of confidential information. The PHY_IO privilege ...
    2 KB (316 words) - 10:30, 2 March 2019
  • ... each operating system (Alpha or Integrity servers), and is accessible by every user and node of the OpenVMS Cluster. With the shared SYSUAF file ...
    13 KB (1,893 words) - 08:30, 17 July 2019
  • ... generally discouraged, but, if done, must be executed with extreme care. Because the user stack is mapped in P1, it is possible that references to the ...
    27 KB (4,468 words) - 12:46, 28 November 2019
  • ... Get the value of a CLI symbol. - LIB$GET_USERS_LANGUAGE Return the user's language choice. - LIB$GET_VM Allocate virtual memory. ...
    14 KB (2,134 words) - 08:42, 13 November 2019
  • ... file you specified. Note that you can redefine SYS$OUTPUT in user mode (with DEFINE/USER_MODE) to redirect output from an image. This definition is ...
    3 KB (409 words) - 11:29, 29 November 2019
  • ... days). It should not be set to less than PWDLIFETIME in the User record user record . The default size of the password history list is 60 words; it ...
    1 KB (188 words) - 07:50, 13 December 2019
  • ... system objects and resources. Privileges are stored in each user's User record user record in the SYSUAF file. =Types of process privileges ...
    1 KB (156 words) - 09:26, 18 December 2018
  • ... the system. However, requiring system passwords can appear confusing when authorized users are unaware that they are required on certain terminals. To ...
    4 KB (600 words) - 11:51, 18 January 2019
  • ... table in executive mode. =Welcome message= The welcome message appears after the user has logged in. It is controlled by the SYS$WELCOME logical name. ...
    2 KB (309 words) - 12:38, 18 January 2019
  • ... time limitation, he or she cannot log in for a while, even with a valid user name and password. At a later point, the restriction eases, and login is ...
    2 KB (338 words) - 13:26, 18 January 2019
  • ... the operations that can be performed are: Modification of all user authorization records (SYSUAF.DAT) Modification of all rights identifier and ...
    3 KB (433 words) - 07:24, 28 February 2019
  • ... detached processes of its UIC. You should, however, grant this privilege to users who need to exercise control over the processes and operations of ...
    1 KB (165 words) - 07:37, 28 February 2019
  • ... to create an unlimited number of group logical names. When unqualified users have the unrestricted ability to create group logical names, excessive ...
    1 KB (204 words) - 07:39, 28 February 2019
  • ... database using the LANCP utility commands depending on your user privileges. Privileged users can add or delete device entries from each database ...
    14 KB (2,009 words) - 18:06, 5 April 2019
  • ... documented as three unique commands, which makes online help more user friendly. - SET SHADOW Several additions to support Host-Based Minimerge. ...
    10 KB (1,482 words) - 08:05, 2 December 2019
  • ... logical names and Symbol symbols , every word or symbol entered by the user on the command line is identified as one of the following elements ...
    5 KB (718 words) - 08:05, 2 December 2019
  • ... detached processes of its UIC. You should, however, grant this privilege to users who need to exercise control over the processes and operations of ...
    1 KB (165 words) - 16:08, 23 July 2019
  • ... as a separate procedure. Embedded SQL in FORTRAN 1.5.9 Allow the user to set additional compiler qualifiers and defines New command for ...
    4 KB (531 words) - 07:00, 20 April 2021
  • ... but an external database (mySQL…) can be used instead of hsqldb. Users access Lucane by a Java client or a browser (IE, Mozilla…). Ported ...
    28 KB (4,116 words) - 11:35, 19 October 2021
  • ... or ignore the case (whether preserved or not). /CLEAR clears all user capabilities or CPU affinities defined by the position values n specified by ...
    5 KB (790 words) - 05:42, 16 April 2021
  • ... current time on PC, and the extractor must not ask anything from the user, that is, it should always overwrite or skip. 2. If '''unzipCmd''' is not ...
    7 KB (1,063 words) - 04:15, 10 July 2020
  • ... account that will be used for the SSH connection. '''Optional''' password - User password that will be used for the SSH connection. If it is omitted ...
    23 KB (3,451 words) - 06:37, 15 December 2021
  • ... The wiki model used to create this encyclopedia allows any registered user to write an article or suggest changes to an existing article ...
    7 KB (921 words) - 13:44, 15 November 2023
  • ... ;" Integer The user-specified timeout value set for the device. If the user has not set a value by using the SETSHOSHADOW utility, the value of ...
    37 KB (5,607 words) - 11:27, 28 October 2022
  • ... to a queue, the queue manager performs the following tasks: Receives the user's queue request, including information about the type of job, the file ...
    8 KB (1,345 words) - 17:56, 20 May 2020
  • ... Change the default only on restricted memory systems with a small number of users and little or no file activity that requires XQP intervention. Such ...
    7 KB (1,120 words) - 04:01, 23 August 2018
  • ... a process while it is running the image to which the Subsystem ACE applies. Users with execute access to the image can access objects that are in the ...
    3 KB (380 words) - 12:35, 28 November 2019
  • ... authorization file that holds User record user records on an OpenVMS system. By default, it is located in SYS$SYSTEM. A logical name, SYSUAF, can ...
    764 bytes (118 words) - 12:39, 28 November 2019
  • ... File specification file specifications when no directory is specified. When a user logs in, their default directory is the directory specified in ...
    2 KB (250 words) - 06:13, 20 December 2018
  • ... master file directory is used to list the reserved files and users' file directories; users seldom enter files into the MFD, even on private volumes. ...
    2 KB (326 words) - 08:48, 20 December 2018
  • ... $ $ This command defines a message or file to be displayed after each user $ logs in. To override the default welcome message and provide your own ...
    17 KB (2,405 words) - 05:06, 14 February 2019
  • ... by using the DCL commands SET SECURITY. Grant this privilege only to users who function as group managers. If this privilege is given to unqualified ...
    1 KB (236 words) - 10:02, 2 March 2019
  • ... $DGBLSC . This privilege should be granted with caution. If unqualified user processes have unrestricted access to physical memory, the operating ...
    681 bytes (103 words) - 10:27, 2 March 2019
  • ... _AUDIT $FREE $FREE_USER_CAPABILITY ( Alpha and ... $GET_UNWIND_ENTRY_INFO $GET_USER_CAPABILITY $GOTO_UNWIND $GOTO_ ...
    7 KB (718 words) - 09:43, 2 July 2019
  • ... directory with SET DEFAULT or display with SHOW DEFAULT. So, if the user's default directory is their SYS$LOGIN and they want to access a file inside ...
    5 KB (717 words) - 14:14, 3 December 2019
  • ... four access types: Read, Write, Create, Delete. The volume's owner and users with VOLPRO privilege have control access to the volume. By default ...
    3 KB (399 words) - 11:05, 3 December 2019
  • ... in the cluster. The second call requests that only the processes whose user name either starts with an "M" or is "SYSTEM" be processed. The third ...
    7 KB (1,137 words) - 10:04, 5 April 2019
  • ... the same UIC on another Node node . A value of 0 requires that a user have DETACH or CMKRNL privilege to create a process on another ...
    469 bytes (69 words) - 13:12, 8 April 2019
  • ... plus 2 entries, with the total rounded up to an even number. Users with CMKRNL privilege can change this parameter on a running system. Increasing ...
    1 KB (188 words) - 06:19, 9 April 2019
  • ... commands ASSIGN and DEFINE to add names to the system logical name table in user or executive mode and can use the DEASSIGN command in either mode to ...
    1 KB (187 words) - 19:09, 3 June 2022
  • ... from binary to ASCII or vice versa—but prevents unauthorized users from translating the identifier. - KGB$V_NOACCESS Makes any access rights ...
    4 KB (550 words) - 07:17, 9 July 2019
  • ... - SS$_NORIGHTSDB The rights database does not exist. - RMS$_PRV The user does not have write access to the rights database. Because the ...
    5 KB (698 words) - 12:23, 15 July 2019
  • ... the internal name and backlink of files and directories to be read if the user has either execute or read access to the file or directory. If this bit ...
    3 KB (446 words) - 16:05, 1 July 2019
  • ... is being used by a restricted set of users. You must create a user authorization file named SYSUAFALT prior to setting UAFALTERNATE to 1. UAFALTERNATE ...
    651 bytes (100 words) - 15:53, 2 July 2019
  • ... whose working sets are not large. Systems whose user bases consist of a small number of users (or processes) that require large amounts of physical ...
    730 bytes (121 words) - 16:22, 2 July 2019
  • ... that specifies the maximum number of Detached Process detached processes with the cited user name that can be active at one time. To prevent the ...
    346 bytes (54 words) - 07:54, 3 July 2019
  • ... _ACE Returns the ACE in the object’s ACL that grants or denies the user access to that object. OSS$_ACL_GRANT_ACE returns the ACE found in the ...
    13 KB (2,135 words) - 10:47, 3 February 2020
  • ... buffer periodically to read the data. The user must call the $INIT_SYS_ALIGN_ ... by 32- or 64-bit reference The user buffer in which the alignment fault ...
    2 KB (386 words) - 12:48, 28 November 2019

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)