Search results

Jump to: navigation, search
  • ... for file I/O. There are different Object access types set for each particular object; security alarms and audit can be enabled to track access to ...
    1 KB (205 words) - 12:57, 28 March 2019
  • ... that can be managed for protected objects of each class. class="wikitable" - Object class Access types - Capability Capabilities ...
    854 bytes (111 words) - 05:50, 23 August 2018
  • '''OBJECT''' is a group of Privileges privileges that has potential to compromise ... the process from reading an object (such as UIC Protection or ...
    610 bytes (88 words) - 18:00, 23 July 2019
  • ... the top of the ACL. - OSS$_ACL_READ Returns the portion of the object’s ACL to the buffer pointed to by the buffer address. - OSS$_ACL_READ ...
    13 KB (2,135 words) - 10:47, 3 February 2020
  • ... the buffer will be the same as the length of item_value . ;parameters : il:object : item list : item:int : item to add : item_value:str : value to add ...
    37 KB (5,969 words) - 23:26, 6 July 2022
  • ... or kernel mode or possess the AUDIT privilege. Usually, $CHKPRO generates an object access audit when an audit is required. The caller can specify the ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... on Ataxx, a popular arcade video game. It is a game of position and movement. The object is to have the most pieces of your color on the board at the ...
    228 KB (33,783 words) - 18:52, 12 July 2023
  • ... fied in network proxy authorization file - NSA$C_MSG_OBJ_ACCESS Object access attempted - OBJ_ACCESS Access attempted to create, delete, or ...
    14 KB (2,109 words) - 02:26, 26 November 2021
  • ... of the parent directory. SET SECURITY does not copy any ACE on the source object if the ACE holds the nopropagate attribute nor does it change any ACE ...
    8 KB (1,169 words) - 13:43, 3 December 2019
  • ... users, and to all other users. The system manager can protect system objects with access control lists (ACLs) that allow access to be granted or ...
    73 KB (10,966 words) - 01:24, 5 June 2022
  • ... an aligned object. Since the compiler determines the alignment of the dereferenced object from the type of the pointer, and the program is allowed to ...
    19 KB (2,839 words) - 12:30, 19 September 2023
  • ... ACE in the access control list (ACL) of an object. To audit all objects of a class, use the ACCESS keyword. - ALL Specifies all system events and ...
    8 KB (1,069 words) - 15:37, 11 December 2019
  • ... an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. Users have no access to the subsystem ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... Define the main target depending on the project type Define object dependencies '''NOTE''': For some languages the compilation order is important. ...
    8 KB (513 words) - 10:30, 20 August 2019
  • '''Default protection''' is the security profile of an object that the object gets when it is created unless a different security profile is specified ...
    3 KB (392 words) - 05:59, 25 February 2019
  • ... volumes Grant this privilege with extreme caution because it overrides all object protection. It should be reserved for use by well-tested, reliable ...
    3 KB (433 words) - 07:24, 28 February 2019
  • ... audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to ...
    7 KB (876 words) - 13:49, 14 December 2021
  • ... a remote node failed for one of the following reasons: The object requested does not exist. The access control information specified is invalid. ...
    122 KB (18,338 words) - 07:03, 23 December 2019
  • ... The options include: DEBUG excludes local symbol table information in the object file for use with the debugger. If the /DEBUG qualifier is also ...
    4 KB (529 words) - 09:22, 8 February 2023
  • ... that the process uses a vector instruction =Permanence of the object= The capability object's security profile needs to be reset each time the ...
    1 KB (232 words) - 05:55, 23 August 2018
  • ... the table below). These flags are used to define the scope of the object search specified in the call to the $GETQUI system service. Note that the ...
    7 KB (1,022 words) - 15:35, 26 November 2019
  • ... system logical names in the name table - SYSPRV Access objects through the system protection field - UPGRADE (privilege) Write to ...
    976 bytes (135 words) - 18:11, 23 July 2019
  • ... not. '''Owner''' refers to users whose UIC exactly matches that of the object's owner. '''Group''' refers to users whose UIC group matches that of the ...
    2 KB (409 words) - 13:01, 14 March 2019
  • ... class, the service determines whether you enabled auditing for the associated object access event. When an alarm or an audit is required, $CHKPRO ...
    5 KB (781 words) - 09:55, 12 December 2019
  • ... to that device; therefore, it is necessary to reset the specific object profile by using the DCL command SET SECURITY (see “Modifying a Security ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... and the dependencies between them. You can also list the files and other objects that make up each product, or the history of installation and upgrade ...
    7 KB (1,065 words) - 09:26, 15 February 2019
  • ... job trees - 4 Allows security profile changes to protected objects on a local node when the object server is absent and cannot update the cluster ...
    3 KB (446 words) - 16:05, 1 July 2019
  • ... an options file. Because a symbol table file is processed as an object module, it requires no identifying qualifier. - Options file .OPT Text ...
    4 KB (611 words) - 09:40, 6 July 2023
  • ... to it. On x86-64, there is no short data. All data defined in an object module will go where the module goes (except the defining PSECT, which is ...
    9 KB (1,472 words) - 10:33, 22 November 2023
  • ... when the end of the list is reached. A wildcard can represent only object names, not object numbers. Here is how the queue context advances when using ...
    16 KB (2,584 words) - 06:39, 4 September 2018
  • ... of the list is reached. A wildcard can represent only object names, not object numbers. flags '''DISPLAY_ENTRY''' can be used with the following ...
    7 KB (1,084 words) - 14:18, 26 November 2019
  • ... a default protection code through a directory structure Identifier ACE for object access control Creator ACE to set the ownership access ...
    575 bytes (85 words) - 12:34, 28 November 2019
  • ... : $ create/directory jdoe.sub.sub2 $ show security jdoe sub.dir DSA1: 000000.JDOE SUB.DIR;1 object of class FILE Owner: WRITERS,JDOE Protection ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... is referenced by an event flag number. =Naming rules= The name of the object is whatever character string was supplied as an argument to the Associate ...
    3 KB (466 words) - 05:59, 23 August 2018
  • ... is a privilege that gives the process the access rights provided by the object's system protection field when the process;s group matches the group of ...
    1 KB (236 words) - 10:02, 2 March 2019
  • ... on OpenVMS I64 systems, with some exceptions. - Checksum utility CHECKSUM/OBJECT command enhanced for I64 objects. - DCE RPC Supports both ...
    10 KB (1,482 words) - 08:05, 2 December 2019
  • ... , SYSPRV belongs to the All group of privileges. Even if an object is protected against system access, a process with SYSPRV privilege can change ...
    3 KB (446 words) - 04:53, 21 July 2019
  • ... which permits writing and deleting, READALL permits only the reading of objects and allows updating of such backup-related file characteristics as the ...
    765 bytes (106 words) - 18:04, 23 July 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    2 KB (323 words) - 09:14, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    6 KB (840 words) - 10:22, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    24 KB (3,615 words) - 12:25, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    4 KB (640 words) - 13:25, 26 November 2019
  • ... The item that can be specified with TRANSLATE_QUEUE is "QUEUE_NAME". Object Id Object Id is the logical name that you wish to translate. =Example ...
    578 bytes (88 words) - 14:06, 26 November 2019
  • ... file-spec ,... The MESSAGE command compiles a .MSG source file into an object modules. The message object module can then be linked with the facility ...
    1 KB (153 words) - 11:45, 19 July 2023
  • ... Access Control Lists''', or '''ACLs''' ("ackles"), are a way to control access to objects on an OpenVMS system by granting various types of access to ...
    548 bytes (85 words) - 09:23, 18 September 2023
  • ... identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...
    3 KB (380 words) - 12:35, 28 November 2019
  • ... an OpenVMS system to access system objects and resources. Privileges are stored in ... : Potential to compromise object security ALL privileges ...
    1 KB (156 words) - 09:26, 18 December 2018
  • ... assembler - .MSG Source file that specifies the text of messages - .OBJ Object file created by a language compiler or assembler - .OLB ...
    4 KB (600 words) - 07:09, 19 December 2018
  • '''VOLPRO''' is a Privileges privilege in the Objects group that allows the user to perform various operations on Volume volumes . The VOLPRO ...
    2 KB (262 words) - 08:31, 17 July 2019
  • ... the process with the same group as the object owner the access rights provided by the object's system protection field. See UIC Protection for ...
    525 bytes (76 words) - 16:06, 23 July 2019

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)