Search results
- ... for file I/O. There are different Object access types set for each particular object; security alarms and audit can be enabled to track access to ...1 KB (205 words) - 12:57, 28 March 2019
- ... that can be managed for protected objects of each class. class="wikitable" - Object class Access types - Capability Capabilities ...854 bytes (111 words) - 05:50, 23 August 2018
- '''OBJECT''' is a group of Privileges privileges that has potential to compromise ... the process from reading an object (such as UIC Protection or ...610 bytes (88 words) - 18:00, 23 July 2019
- ... the top of the ACL. - OSS$_ACL_READ Returns the portion of the object’s ACL to the buffer pointed to by the buffer address. - OSS$_ACL_READ ...13 KB (2,135 words) - 10:47, 3 February 2020
- ... the buffer will be the same as the length of item_value . ;parameters : il:object : item list : item:int : item to add : item_value:str : value to add ...37 KB (5,969 words) - 23:26, 6 July 2022
- ... or kernel mode or possess the AUDIT privilege. Usually, $CHKPRO generates an object access audit when an audit is required. The caller can specify the ...15 KB (2,536 words) - 09:56, 8 June 2019
- ... on Ataxx, a popular arcade video game. It is a game of position and movement. The object is to have the most pieces of your color on the board at the ...228 KB (33,783 words) - 18:52, 12 July 2023
- ... fied in network proxy authorization file - NSA$C_MSG_OBJ_ACCESS Object access attempted - OBJ_ACCESS Access attempted to create, delete, or ...14 KB (2,109 words) - 02:26, 26 November 2021
- ... of the parent directory. SET SECURITY does not copy any ACE on the source object if the ACE holds the nopropagate attribute nor does it change any ACE ...8 KB (1,169 words) - 13:43, 3 December 2019
- ... users, and to all other users. The system manager can protect system objects with access control lists (ACLs) that allow access to be granted or ...73 KB (10,966 words) - 01:24, 5 June 2022
- ... an aligned object. Since the compiler determines the alignment of the dereferenced object from the type of the pointer, and the program is allowed to ...19 KB (2,839 words) - 12:30, 19 September 2023
- ... ACE in the access control list (ACL) of an object. To audit all objects of a class, use the ACCESS keyword. - ALL Specifies all system events and ...8 KB (1,069 words) - 15:37, 11 December 2019
- ... an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. Users have no access to the subsystem ...6 KB (949 words) - 14:04, 4 December 2019
- ... Define the main target depending on the project type Define object dependencies '''NOTE''': For some languages the compilation order is important. ...8 KB (513 words) - 10:30, 20 August 2019
- '''Default protection''' is the security profile of an object that the object gets when it is created unless a different security profile is specified ...3 KB (392 words) - 05:59, 25 February 2019
- ... volumes Grant this privilege with extreme caution because it overrides all object protection. It should be reserved for use by well-tested, reliable ...3 KB (433 words) - 07:24, 28 February 2019
- ... audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to ...7 KB (876 words) - 13:49, 14 December 2021
- ... a remote node failed for one of the following reasons: The object requested does not exist. The access control information specified is invalid. ...122 KB (18,338 words) - 07:03, 23 December 2019
- ... The options include: DEBUG excludes local symbol table information in the object file for use with the debugger. If the /DEBUG qualifier is also ...4 KB (529 words) - 09:22, 8 February 2023
- ... that the process uses a vector instruction =Permanence of the object= The capability object's security profile needs to be reset each time the ...1 KB (232 words) - 05:55, 23 August 2018
- ... the table below). These flags are used to define the scope of the object search specified in the call to the $GETQUI system service. Note that the ...7 KB (1,022 words) - 15:35, 26 November 2019
- ... system logical names in the name table - SYSPRV Access objects through the system protection field - UPGRADE (privilege) Write to ...976 bytes (135 words) - 18:11, 23 July 2019
- ... not. '''Owner''' refers to users whose UIC exactly matches that of the object's owner. '''Group''' refers to users whose UIC group matches that of the ...2 KB (409 words) - 13:01, 14 March 2019
- ... class, the service determines whether you enabled auditing for the associated object access event. When an alarm or an audit is required, $CHKPRO ...5 KB (781 words) - 09:55, 12 December 2019
- ... to that device; therefore, it is necessary to reset the specific object profile by using the DCL command SET SECURITY (see “Modifying a Security ...10 KB (1,603 words) - 08:47, 3 February 2020
- ... and the dependencies between them. You can also list the files and other objects that make up each product, or the history of installation and upgrade ...7 KB (1,065 words) - 09:26, 15 February 2019
- ... job trees - 4 Allows security profile changes to protected objects on a local node when the object server is absent and cannot update the cluster ...3 KB (446 words) - 16:05, 1 July 2019
- ... an options file. Because a symbol table file is processed as an object module, it requires no identifying qualifier. - Options file .OPT Text ...4 KB (611 words) - 09:40, 6 July 2023
- ... to it. On x86-64, there is no short data. All data defined in an object module will go where the module goes (except the defining PSECT, which is ...9 KB (1,472 words) - 10:33, 22 November 2023
- ... when the end of the list is reached. A wildcard can represent only object names, not object numbers. Here is how the queue context advances when using ...16 KB (2,584 words) - 06:39, 4 September 2018
- ... of the list is reached. A wildcard can represent only object names, not object numbers. flags '''DISPLAY_ENTRY''' can be used with the following ...7 KB (1,084 words) - 14:18, 26 November 2019
- ... a default protection code through a directory structure Identifier ACE for object access control Creator ACE to set the ownership access ...575 bytes (85 words) - 12:34, 28 November 2019
- ... : $ create/directory jdoe.sub.sub2 $ show security jdoe sub.dir DSA1: 000000.JDOE SUB.DIR;1 object of class FILE Owner: WRITERS,JDOE Protection ...5 KB (725 words) - 05:42, 25 February 2019
- ... is referenced by an event flag number. =Naming rules= The name of the object is whatever character string was supplied as an argument to the Associate ...3 KB (466 words) - 05:59, 23 August 2018
- ... is a privilege that gives the process the access rights provided by the object's system protection field when the process;s group matches the group of ...1 KB (236 words) - 10:02, 2 March 2019
- ... on OpenVMS I64 systems, with some exceptions. - Checksum utility CHECKSUM/OBJECT command enhanced for I64 objects. - DCE RPC Supports both ...10 KB (1,482 words) - 08:05, 2 December 2019
- ... , SYSPRV belongs to the All group of privileges. Even if an object is protected against system access, a process with SYSPRV privilege can change ...3 KB (446 words) - 04:53, 21 July 2019
- ... which permits writing and deleting, READALL permits only the reading of objects and allows updating of such backup-related file characteristics as the ...765 bytes (106 words) - 18:04, 23 July 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...2 KB (323 words) - 09:14, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...6 KB (840 words) - 10:22, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...24 KB (3,615 words) - 12:25, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...4 KB (640 words) - 13:25, 26 November 2019
- ... The item that can be specified with TRANSLATE_QUEUE is "QUEUE_NAME". Object Id Object Id is the logical name that you wish to translate. =Example ...578 bytes (88 words) - 14:06, 26 November 2019
- ... file-spec ,... The MESSAGE command compiles a .MSG source file into an object modules. The message object module can then be linked with the facility ...1 KB (153 words) - 11:45, 19 July 2023
- ... Access Control Lists''', or '''ACLs''' ("ackles"), are a way to control access to objects on an OpenVMS system by granting various types of access to ...548 bytes (85 words) - 09:23, 18 September 2023
- ... identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...3 KB (380 words) - 12:35, 28 November 2019
- ... an OpenVMS system to access system objects and resources. Privileges are stored in ... : Potential to compromise object security ALL privileges ...1 KB (156 words) - 09:26, 18 December 2018
- ... assembler - .MSG Source file that specifies the text of messages - .OBJ Object file created by a language compiler or assembler - .OLB ...4 KB (600 words) - 07:09, 19 December 2018
- '''VOLPRO''' is a Privileges privilege in the Objects group that allows the user to perform various operations on Volume volumes . The VOLPRO ...2 KB (262 words) - 08:31, 17 July 2019
- ... the process with the same group as the object owner the access rights provided by the object's system protection field. See UIC Protection for ...525 bytes (76 words) - 16:06, 23 July 2019
- ... information. - LIB$GET_ACCNAM Get access name table for a security object identified by name. - LIB$GET_ACCNAM_BY_CONTEXT Get access ...14 KB (2,134 words) - 08:42, 13 November 2019
- ... ://github.com/oveas/OMI Github - OmniORB for OpenVMS omniORB is a CORBA object request broker for C++ and Python. It is very fast, robust, and ...28 KB (4,116 words) - 11:35, 19 October 2021
- ... Images without activation information are not defined in the OpenVMS I64 object language. As a result, the OpenVMS I64 linker does not create this ...2 KB (298 words) - 08:54, 6 July 2023
- ... another user NETMBX may create network device SYSPRV may access objects via system protection TMPMBX may create temporary mailbox Process rights ...49 KB (7,079 words) - 07:13, 20 October 2021
- ... unit, data type, datetime conversion, returning information about system objects and establishing context for such information, etc. Conversion and ...6 KB (881 words) - 17:24, 7 January 2020
- ... identifiers, are labels used to grant users access to system objects (as an alternative to UIC access ). They are stored in RIGHTSLIST.DAT ...6 KB (895 words) - 12:38, 28 November 2019
- ... be sent to all security Operator terminal operator terminals whenever the object is successfully or unsuccessfully accessed in the specified ways. ...3 KB (473 words) - 12:35, 28 November 2019
- ... System security log file system security log file whenever the object is successfully or unsuccessfully accessed in the specified ways. A message ...3 KB (429 words) - 12:34, 28 November 2019
- ... Identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...3 KB (477 words) - 12:34, 28 November 2019
- ... that the system-supplied command procedures used to implement network objects function properly. /DEVICE specifies the device that holds the ...8 KB (1,100 words) - 14:43, 3 December 2019
- ... to the SCSI driver (GKDRIVER) - Process a diagnostic buffer $QUI request to a TU58 magnetic tape (TUDRIVER) - Category:Objects Privileges821 bytes (121 words) - 07:33, 28 February 2019
- ... mandatory access controls. The privilege lets a process write to an object of lower secrecy, in violation of the Bell and LaPadula confinement ...358 bytes (50 words) - 07:34, 28 February 2019
- ... Thus, there are no restrictions on the files, directories, and other objects to which a detached process can gain access. The IMPERSONATE privilege ...1 KB (211 words) - 10:06, 2 March 2019
- ... SET VOLUME/ACCESSED, MOUNT/ACCESSED, $MOUNT - Connect to an object while executor state is restricted - Read network event-logging buffer ...6 KB (963 words) - 11:28, 2 December 2019
- ... , the updated files will be uploaded to the OpenVMS system. Previously created object and listing files (.OBJ, .LIS) will be removed from the OpenVMS ...5 KB (708 words) - 04:10, 10 July 2020
- ... Project types ''executable'' - executable image is created ''library'' - object library (OLB) is created ''shareable'' - shareable image is ...3 KB (433 words) - 08:37, 20 March 2020
- ... the project is built for debugging purpose. '''outdir''' - Output directory where object, listing and executable files will be stored when built. Is ...5 KB (676 words) - 19:33, 24 June 2022
- ... NO Configures certain network nodes as name servers that associate objects with network names. - LATCP Local Area Transport Control Program ...13 KB (1,893 words) - 08:30, 17 July 2019
- ... memory, measured in pagelets, that can be associated with a single buffer object created by a process in user mode on Alpha and Integrity ...392 bytes (60 words) - 09:40, 9 April 2019
- ... that can be used in place of another name to represent system objects such as files, directories, devices, or queues. For example, you might assign ...3 KB (515 words) - 08:45, 6 July 2023
- ... definition will be used. =Security= A logical name table is also a protected object class, which means that a protection code can be defined for ...2 KB (386 words) - 13:18, 2 June 2019
- ... Access a MAIL maintenance record Modify a MAIL forward record Declare a network object Create an IPC association With CMKRNL, add or remove an ...1 KB (187 words) - 19:09, 3 June 2022
- ... delimited with a space. Parameter The purpose of parameters is to provide objects for the command verb to perform operations on (such as symbols ...5 KB (718 words) - 08:05, 2 December 2019
- ... mandatory access controls. The privilege allows a process to write to an object of higher integrity. This privilege is reserced for enhanced security ...393 bytes (58 words) - 15:24, 23 July 2019
- ... mandatory access controls. The privilege allows a process to write to an object of higher integrity. This privilege is reserved for enhanced security ...280 bytes (40 words) - 18:07, 23 July 2019
- ... reading authorization file - PCB$V_NETWRK Process is a network connect object - PCB$V_NOACNT No accounting for process - PCB$V_NODELET ...49 KB (8,143 words) - 07:47, 14 November 2019
- ... , QUI$_SEARCH_NUMBER, and QUI$_SEARCH_USERNAME. These item codes specify the object name or number for which $GETQUI is to return information and the ...47 KB (7,858 words) - 12:47, 28 November 2019
- ... by all equivalence strings; when it is used in a command like CREATE, the object is created at the first available location. In the following example ...1 KB (192 words) - 08:30, 28 November 2019
- ... CHECKSUM filespec Qualifiers /ALGORITHM /ALPHA /FILE /I64 /IMAGE /OBJECT /OUTPUT /SHOW /VAX Category:DCL Commands Category ...520 bytes (71 words) - 13:58, 2 December 2019
- ... memory. =Syntax= SHOW MEMORY Qualifiers /ALL /BITMAP /BUFFER_OBJECTS /CACHE /EXACT /FILES /FULL /GH_REGIONS /HIGHLIGHT /OUTPUT ...398 bytes (50 words) - 10:54, 3 December 2019
- ... Syntax= SET COMMAND filespec ,... Qualifiers /DELETE /LISTING /OBJECT /OUTPUT /REPLACE /TABLE =See also= Template:UtilitiesI ...364 bytes (46 words) - 11:53, 3 December 2019
- ... security alarms). The audit server process is started automatically; cluster object support requires the audit server. To shut down security auditing ...2 KB (378 words) - 09:56, 23 August 2023
- ... in an ACL is important. ACEs granting or denying access to an object for specific users must appear before ACEs identifying broader classes of users. ...538 bytes (86 words) - 19:03, 12 December 2019
- ... invokes the ACL Editor utility which allows you to edit the Object Class object's ACL . Category:DCL Commands Category:Security200 bytes (28 words) - 19:04, 12 December 2019
- ... C++ for OpenVMS is a native programming language product, which generates highly optimized object code. VSI C++ for OpenVMS is based on the ANSI/ISO ...2 KB (339 words) - 08:42, 4 April 2020
- ... will be built and linked in the executable image '''library''' - object library (OLB) will be created '''shareable''' - extension will create ...23 KB (3,451 words) - 06:37, 15 December 2021
- ... on a "description file" (or "makefile") you create that lists the sources and objects of a system and the dependencies between them. MMK is similar in ...432 bytes (70 words) - 12:20, 24 January 2023
- ... ''' controlling versions of code ('''generations''') manipulating '''groups''' of objects as a unit manipulating versions of the entire system ...9 KB (1,304 words) - 12:56, 19 December 2022
- ... . Choose Convert inherited permissions into explicit permissions on this object when prompted. Remove all permissions from the file except for ...9 KB (1,393 words) - 13:25, 29 June 2023