Search results
- ... for file I/O. There are different Object access types set for each particular object; security alarms and audit can be enabled to track access to ...1 KB (205 words) - 12:57, 28 March 2019
- ... that can be managed for protected objects of each class. class="wikitable" - Object class Access types - Capability Capabilities ...854 bytes (111 words) - 05:50, 23 August 2018
- '''OBJECT''' is a group of Privileges privileges that has potential to compromise ... the process from reading an object (such as UIC Protection or ...610 bytes (88 words) - 18:00, 23 July 2019
- ... the top of the ACL. - OSS$_ACL_READ Returns the portion of the object’s ACL to the buffer pointed to by the buffer address. - OSS$_ACL_READ ...13 KB (2,135 words) - 10:47, 3 February 2020
- ... the buffer will be the same as the length of item_value . ;parameters : il:object : item list : item:int : item to add : item_value:str : value to add ...37 KB (5,969 words) - 23:26, 6 July 2022
- ... or kernel mode or possess the AUDIT privilege. Usually, $CHKPRO generates an object access audit when an audit is required. The caller can specify the ...15 KB (2,536 words) - 09:56, 8 June 2019
- ... on Ataxx, a popular arcade video game. It is a game of position and movement. The object is to have the most pieces of your color on the board at the ...228 KB (33,783 words) - 18:52, 12 July 2023
- ... fied in network proxy authorization file - NSA$C_MSG_OBJ_ACCESS Object access attempted - OBJ_ACCESS Access attempted to create, delete, or ...14 KB (2,109 words) - 02:26, 26 November 2021
- ... of the parent directory. SET SECURITY does not copy any ACE on the source object if the ACE holds the nopropagate attribute nor does it change any ACE ...8 KB (1,169 words) - 13:43, 3 December 2019
- ... users, and to all other users. The system manager can protect system objects with access control lists (ACLs) that allow access to be granted or ...73 KB (10,966 words) - 01:24, 5 June 2022
- ... an aligned object. Since the compiler determines the alignment of the dereferenced object from the type of the pointer, and the program is allowed to ...19 KB (2,839 words) - 12:30, 19 September 2023
- ... ACE in the access control list (ACL) of an object. To audit all objects of a class, use the ACCESS keyword. - ALL Specifies all system events and ...8 KB (1,069 words) - 15:37, 11 December 2019
- ... an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. Users have no access to the subsystem ...6 KB (949 words) - 14:04, 4 December 2019
- ... Define the main target depending on the project type Define object dependencies '''NOTE''': For some languages the compilation order is important. ...8 KB (513 words) - 10:30, 20 August 2019
- '''Default protection''' is the security profile of an object that the object gets when it is created unless a different security profile is specified ...3 KB (392 words) - 05:59, 25 February 2019
- ... volumes Grant this privilege with extreme caution because it overrides all object protection. It should be reserved for use by well-tested, reliable ...3 KB (433 words) - 07:24, 28 February 2019
- ... audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to ...7 KB (876 words) - 13:49, 14 December 2021
- ... a remote node failed for one of the following reasons: The object requested does not exist. The access control information specified is invalid. ...122 KB (18,338 words) - 07:03, 23 December 2019
- ... The options include: DEBUG excludes local symbol table information in the object file for use with the debugger. If the /DEBUG qualifier is also ...4 KB (529 words) - 09:22, 8 February 2023
- ... that the process uses a vector instruction =Permanence of the object= The capability object's security profile needs to be reset each time the ...1 KB (232 words) - 05:55, 23 August 2018
- ... the table below). These flags are used to define the scope of the object search specified in the call to the $GETQUI system service. Note that the ...7 KB (1,022 words) - 15:35, 26 November 2019
- ... system logical names in the name table - SYSPRV Access objects through the system protection field - UPGRADE (privilege) Write to ...976 bytes (135 words) - 18:11, 23 July 2019
- ... not. '''Owner''' refers to users whose UIC exactly matches that of the object's owner. '''Group''' refers to users whose UIC group matches that of the ...2 KB (409 words) - 13:01, 14 March 2019
- ... class, the service determines whether you enabled auditing for the associated object access event. When an alarm or an audit is required, $CHKPRO ...5 KB (781 words) - 09:55, 12 December 2019
- ... to that device; therefore, it is necessary to reset the specific object profile by using the DCL command SET SECURITY (see “Modifying a Security ...10 KB (1,603 words) - 08:47, 3 February 2020
- ... and the dependencies between them. You can also list the files and other objects that make up each product, or the history of installation and upgrade ...7 KB (1,065 words) - 09:26, 15 February 2019
- ... job trees - 4 Allows security profile changes to protected objects on a local node when the object server is absent and cannot update the cluster ...3 KB (446 words) - 16:05, 1 July 2019
- ... an options file. Because a symbol table file is processed as an object module, it requires no identifying qualifier. - Options file .OPT Text ...4 KB (611 words) - 09:40, 6 July 2023
- ... to it. On x86-64, there is no short data. All data defined in an object module will go where the module goes (except the defining PSECT, which is ...9 KB (1,472 words) - 10:33, 22 November 2023
- ... when the end of the list is reached. A wildcard can represent only object names, not object numbers. Here is how the queue context advances when using ...16 KB (2,584 words) - 06:39, 4 September 2018
- ... of the list is reached. A wildcard can represent only object names, not object numbers. flags '''DISPLAY_ENTRY''' can be used with the following ...7 KB (1,084 words) - 14:18, 26 November 2019
- ... a default protection code through a directory structure Identifier ACE for object access control Creator ACE to set the ownership access ...575 bytes (85 words) - 12:34, 28 November 2019
- ... : $ create/directory jdoe.sub.sub2 $ show security jdoe sub.dir DSA1: 000000.JDOE SUB.DIR;1 object of class FILE Owner: WRITERS,JDOE Protection ...5 KB (725 words) - 05:42, 25 February 2019
- ... is referenced by an event flag number. =Naming rules= The name of the object is whatever character string was supplied as an argument to the Associate ...3 KB (466 words) - 05:59, 23 August 2018
- ... is a privilege that gives the process the access rights provided by the object's system protection field when the process;s group matches the group of ...1 KB (236 words) - 10:02, 2 March 2019
- ... on OpenVMS I64 systems, with some exceptions. - Checksum utility CHECKSUM/OBJECT command enhanced for I64 objects. - DCE RPC Supports both ...10 KB (1,482 words) - 08:05, 2 December 2019
- ... , SYSPRV belongs to the All group of privileges. Even if an object is protected against system access, a process with SYSPRV privilege can change ...3 KB (446 words) - 04:53, 21 July 2019
- ... which permits writing and deleting, READALL permits only the reading of objects and allows updating of such backup-related file characteristics as the ...765 bytes (106 words) - 18:04, 23 July 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...2 KB (323 words) - 09:14, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...6 KB (840 words) - 10:22, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...24 KB (3,615 words) - 12:25, 26 November 2019
- ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...4 KB (640 words) - 13:25, 26 November 2019
- ... The item that can be specified with TRANSLATE_QUEUE is "QUEUE_NAME". Object Id Object Id is the logical name that you wish to translate. =Example ...578 bytes (88 words) - 14:06, 26 November 2019
- ... file-spec ,... The MESSAGE command compiles a .MSG source file into an object modules. The message object module can then be linked with the facility ...1 KB (153 words) - 11:45, 19 July 2023
- ... Access Control Lists''', or '''ACLs''' ("ackles"), are a way to control access to objects on an OpenVMS system by granting various types of access to ...548 bytes (85 words) - 09:23, 18 September 2023
- ... identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...3 KB (380 words) - 12:35, 28 November 2019
- ... an OpenVMS system to access system objects and resources. Privileges are stored in ... : Potential to compromise object security ALL privileges ...1 KB (156 words) - 09:26, 18 December 2018
- ... assembler - .MSG Source file that specifies the text of messages - .OBJ Object file created by a language compiler or assembler - .OLB ...4 KB (600 words) - 07:09, 19 December 2018
- '''VOLPRO''' is a Privileges privilege in the Objects group that allows the user to perform various operations on Volume volumes . The VOLPRO ...2 KB (262 words) - 08:31, 17 July 2019
- ... the process with the same group as the object owner the access rights provided by the object's system protection field. See UIC Protection for ...525 bytes (76 words) - 16:06, 23 July 2019