Search results

Jump to: navigation, search
  • ... against UIC Protection world access . Because a system dump file can contain privileged information, you should keep this level of protection ...
    6 KB (1,127 words) - 13:54, 12 November 2019
  • ... be used as directory files). With sufficient privileges, the directory label can be removed from a file with SET FILE /NODIRECTORY. You can see ...
    5 KB (768 words) - 08:45, 6 July 2023
  • ... - this also means that you cannot edit the files with version 32767 even as a privileged user. =Version number defaults= Various commands default to ...
    2 KB (398 words) - 09:27, 18 September 2023
  • '''OBJECT''' is a group of Privileges privileges that has potential to compromise the security of Object Class protected objects such as ...
    610 bytes (88 words) - 18:00, 23 July 2019
  • ... name. Have the owner of the file or volume change the protection value. - NOPRIV, insufficient privileges for the requested operation ACME, ACME ...
    122 KB (18,338 words) - 07:03, 23 December 2019
  • ... , the directory specification and the image file name. - JPI$_IMAGPRIV Returns a quadword mask of the privileges with which the current image was ...
    49 KB (8,143 words) - 07:47, 14 November 2019
  • ... FAB must indicate a user file open (UFO keyword). The access mode at which the channel was opened must be equal to or less privileged than the access ...
    27 KB (4,468 words) - 12:46, 28 November 2019
  • ... any information stored within the authorization file, including privileges (specific privileges, or privilege classes), last login time, etc. GUESS ...
    228 KB (33,783 words) - 18:52, 12 July 2023
  • ... logged in as system or under a privileged user account). Before starting Tomcat, first edit the file SYS$STARTUP:TOMCAT$DEFS_LOCAL.COM and insert ...
    49 KB (7,079 words) - 07:13, 20 October 2021
  • ... the same group; values such as privileges and quotas can be changed only ... LOCKPWD bit in the user authorization file (UAF) to prevent users from using ...
    24 KB (4,006 words) - 09:56, 8 June 2019
  • ... use of identifiers as privileges should be audited. - INSTALL Specifies modifications made to the known file list through the INSTALL utility. ...
    8 KB (1,069 words) - 15:37, 11 December 2019
  • ... _ID Enable or disable file identification caching. To enable file identification caching, you must have the OPER privilege and you must specify ...
    18 KB (2,869 words) - 14:52, 2 December 2019
  • ... to the object’s owner, group, privileged system users, and to all other ... No limit on the number of closed files that can be cached Control over the ...
    73 KB (10,966 words) - 01:24, 5 June 2022
  • ... when selecting event records. Choose from the following keywords: FILE, FLAGS, PRIVILEGES - LNM_PARENT_NAME Specifies the name of the parent ...
    14 KB (2,109 words) - 02:26, 26 November 2021
  • ... many directories do you plan to have? how many files do you plan to have? what is the ... , you must have the user privilege VOLPRO or be the owner ...
    24 KB (3,938 words) - 14:47, 2 December 2019
  • ... is made in the security audit log file that contains information about that event and ... The system service performs the privilege check and looks at the ...
    5 KB (781 words) - 09:55, 12 December 2019
  • ... string descriptor pointing to the file specification of the image ... creating process, you must have ALTPRI privilege to raise the priority level. If ...
    13 KB (2,104 words) - 07:14, 9 July 2019
  • ... sym a A = "" - IMAGNAME File name of the current image. $ a = f$getjpi("","IMAGNAME") $ show sym a A = "" - IMAGPRIV Privileges with which ...
    22 KB (3,044 words) - 17:48, 28 June 2019
  • ... space to be written to the file named (image-name).DMP in the current default ... you do not have the ALTPRI privilege, the value you specify is compared ...
    5 KB (790 words) - 05:42, 16 April 2021
  • ... and accounts (NETOBJECT.DAT) Unlimited access to all files on all volumes Grant this privilege with extreme caution because it overrides all ...
    3 KB (433 words) - 07:24, 28 February 2019
  • ... requirements for devices that are not file oriented depend on whether the ... requires privilege. The '''LOG_IO''' privilege allows the user's process to ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... the maximum number of shared files that the user can have ... the user is logged in. /PRIVILEGES specifies the authorized Privileges privileges ...
    8 KB (1,100 words) - 14:43, 3 December 2019
  • ... users can work with the data files and other resources of the ... /SUBSYSTEM qualifier - you need the SECURITY privilege to do this. You can turn the ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... ' terminals, and to initialize and control the log file of operators' messages. In addition, this privilege lets the user spool devices, create and ...
    6 KB (963 words) - 11:28, 2 December 2019
  • ... pool. promsk SyservArgument file_protection longword (unsigned) ... the caller are compared. The less privileged (but the higher numeric valued) of ...
    15 KB (2,430 words) - 12:45, 28 November 2019
  • ... DCL commands SET SECURITY. Grant this privilege only to users who function as ... for a volume lock, access a locked file, enable or disable Disk Quota ...
    1 KB (236 words) - 10:02, 2 March 2019
  • ... file specification and return either the expanded file specification or the particular file ... previous state of these privileges for the current process. ...
    6 KB (881 words) - 17:24, 7 January 2020
  • ... system user authorization file ( SYSUAF.DAT ). Exercise caution when granting this privilege. Normally, grant this privilege only to system managers ...
    3 KB (446 words) - 04:53, 21 July 2019
  • ... object classes other than FILE. For FILE class audits, it is assumed ... of CHP$_PROT based on the privileges specified for the accessor (CHP$_PRIV), ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... to limitations. If the source has ALTPRI privilege enabled, the target can be set to ... www.eight-cubed.com/examples/framework.php?file=sys_setpri.c ...
    9 KB (1,345 words) - 10:26, 13 November 2019
  • ... Privileges: NETMBX TMPMBX Identifier Value Attributes APACHE$APR_ALL %X80010002 %UAF-I-NOMODS, no modifications made to system authorization file ... file ...
    50 KB (7,396 words) - 17:34, 26 January 2022
  • ... data anywhere on the selected volume without the benefit of any file structuring. If this privilege is given to unqualified users who have no need for ...
    2 KB (309 words) - 10:17, 2 March 2019
  • ... system audit journal, the security archive file, resource monitoring, and the audit, alarm, or failure mode. This privilege should only be granted to ...
    1 KB (219 words) - 17:24, 23 July 2019
  • ... system audit journal, the security archive file, resource monitoring, and the audit, alarm, or failure mode. This privilege should only be granted to ...
    2 KB (222 words) - 17:27, 23 July 2019
  • ... SECURITY command. Users need the SECURITY privilege to display a hidden ACE with the ... to SUB.DIR. After that, all files created in the SUB directory ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... the messages to the Operator Log File operator log file . Security auditing settings ... and BYPASS : $ SET PROCESS/PRIVILEGES=(OPER,BYPASS) $ MCR ...
    2 KB (378 words) - 09:56, 23 August 2023
  • ... With some types of objects, such as a file or a device, it is possible to select ... mode and uses the least privileged mode. The access modes are defined ...
    13 KB (2,135 words) - 10:47, 3 February 2020
  • ... restrictions on the files, directories, and other objects to which a detached process can gain access. The IMPERSONATE privilege also lets a process ...
    1 KB (211 words) - 10:06, 2 March 2019
  • ... you have the DETACH or CMKRNL privilege, the maximum number of detached ... =command_procedure /OUTPUT=log_file /ERROR=error_file If you want to ...
    2 KB (291 words) - 08:22, 10 July 2019
  • ... to a local user name. The remote user assumes the same file access, rights, and privileges as the local user name. Creating proxy login accounts ...
    2 KB (361 words) - 07:10, 28 February 2019
  • ... keywords =Privileges= Using OPCOM requires the following privileges: ... from OPC$LOGFILE_CLASSES or, if a log file is already open, from the current ...
    2 KB (404 words) - 18:44, 4 June 2019
  • ... messages to be recorded in the log file, replace the Alarm ACEs with Audit ... command. Users need the SECURITY privilege to display a hidden ACE with ...
    3 KB (473 words) - 12:35, 28 November 2019
  • The '''AUDIT''' privilege allows software to append audit records to the system security audit log file using one of four system services: $AUDIT_ ...
    718 bytes (114 words) - 07:21, 28 February 2019
  • ... LOGINOUT. - 10 Allows privileged applications to successfully ... has either execute or read access to the file or directory. If this bit is clear, ...
    3 KB (446 words) - 16:05, 1 July 2019
  • ... are safe from a process with the VOLPRO privilege as long as the process does not ... initializing a magnetic tape after a file access error $INIT_ ...
    2 KB (262 words) - 08:31, 17 July 2019
  • ... included in the ACL of any files created within a directory. When the entry ... command. Users need the SECURITY privilege to display a hidden ACE with ...
    3 KB (429 words) - 12:34, 28 November 2019
  • ... included in the ACL of any files created within a directory. When the entry ... command. Users need the SECURITY privilege to display a hidden ACE with ...
    3 KB (477 words) - 12:34, 28 November 2019
  • ... allows updating of such backup-related file characteristics as the backup date. It is intended to be an adequate privilege for backing up volumes. The ...
    765 bytes (106 words) - 18:04, 23 July 2019
  • ... col;" Description colspan = "col;" Privileges required - PRODUCT CONFIGURE Create a product configuration file (PCF) SYSLCK - PRODUCT COPY ...
    7 KB (1,065 words) - 09:26, 15 February 2019
  • ... depending on your user privileges. Privileged users can add or ... an OpenVMS Cluster. The NISCS_LOAD.EXE file is actually located on $64$DIA14: . The ...
    14 KB (2,009 words) - 18:06, 5 April 2019

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)