Search results

Jump to: navigation, search
  • ... requirements for devices that are not file oriented depend on whether the ... requires privilege. The '''LOG_IO''' privilege allows the user's process to ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... the maximum number of shared files that the user can have ... the user is logged in. /PRIVILEGES specifies the authorized Privileges privileges ...
    8 KB (1,100 words) - 14:43, 3 December 2019
  • ... users can work with the data files and other resources of the ... /SUBSYSTEM qualifier - you need the SECURITY privilege to do this. You can turn the ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... ' terminals, and to initialize and control the log file of operators' messages. In addition, this privilege lets the user spool devices, create and ...
    6 KB (963 words) - 11:28, 2 December 2019
  • ... pool. promsk SyservArgument file_protection longword (unsigned) ... the caller are compared. The less privileged (but the higher numeric valued) of ...
    15 KB (2,430 words) - 12:45, 28 November 2019
  • ... DCL commands SET SECURITY. Grant this privilege only to users who function as ... for a volume lock, access a locked file, enable or disable Disk Quota ...
    1 KB (236 words) - 10:02, 2 March 2019
  • ... file specification and return either the expanded file specification or the particular file ... previous state of these privileges for the current process. ...
    6 KB (881 words) - 17:24, 7 January 2020
  • ... system user authorization file ( SYSUAF.DAT ). Exercise caution when granting this privilege. Normally, grant this privilege only to system managers ...
    3 KB (446 words) - 04:53, 21 July 2019
  • ... object classes other than FILE. For FILE class audits, it is assumed ... of CHP$_PROT based on the privileges specified for the accessor (CHP$_PRIV), ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... to limitations. If the source has ALTPRI privilege enabled, the target can be set to ... www.eight-cubed.com/examples/framework.php?file=sys_setpri.c ...
    9 KB (1,345 words) - 10:26, 13 November 2019
  • ... Privileges: NETMBX TMPMBX Identifier Value Attributes APACHE$APR_ALL %X80010002 %UAF-I-NOMODS, no modifications made to system authorization file ... file ...
    50 KB (7,396 words) - 17:34, 26 January 2022
  • ... data anywhere on the selected volume without the benefit of any file structuring. If this privilege is given to unqualified users who have no need for ...
    2 KB (309 words) - 10:17, 2 March 2019
  • ... system audit journal, the security archive file, resource monitoring, and the audit, alarm, or failure mode. This privilege should only be granted to ...
    1 KB (219 words) - 17:24, 23 July 2019
  • ... system audit journal, the security archive file, resource monitoring, and the audit, alarm, or failure mode. This privilege should only be granted to ...
    2 KB (222 words) - 17:27, 23 July 2019
  • ... SECURITY command. Users need the SECURITY privilege to display a hidden ACE with the ... to SUB.DIR. After that, all files created in the SUB directory ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... the messages to the Operator Log File operator log file . Security auditing settings ... and BYPASS : $ SET PROCESS/PRIVILEGES=(OPER,BYPASS) $ MCR ...
    2 KB (378 words) - 09:56, 23 August 2023
  • ... With some types of objects, such as a file or a device, it is possible to select ... mode and uses the least privileged mode. The access modes are defined ...
    13 KB (2,135 words) - 10:47, 3 February 2020
  • ... restrictions on the files, directories, and other objects to which a detached process can gain access. The IMPERSONATE privilege also lets a process ...
    1 KB (211 words) - 10:06, 2 March 2019
  • ... you have the DETACH or CMKRNL privilege, the maximum number of detached ... =command_procedure /OUTPUT=log_file /ERROR=error_file If you want to ...
    2 KB (291 words) - 08:22, 10 July 2019
  • ... to a local user name. The remote user assumes the same file access, rights, and privileges as the local user name. Creating proxy login accounts ...
    2 KB (361 words) - 07:10, 28 February 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)