Search results

Jump to: navigation, search
  • ... specifies the Account name account name used by the Accounting utility. If the user record is created in a new UIC group, that name is used as ...
    8 KB (1,100 words) - 14:43, 3 December 2019
  • ... Subprocess subprocess , and Batch Process batch users on the system. =Syntax= SHOW USERS username Qualifiers /BATCH /CLUSTER /EXACT ...
    467 bytes (56 words) - 11:12, 3 December 2019
  • ... record locks. For each lock found it displays the process ID, and name, the user name, terminal name and the name of the image being executed. It also ...
    228 KB (33,783 words) - 18:52, 12 July 2023
  • ... code (UIC). To log in and gain access to the system, the user must supply a valid user name and password. The password is encoded and does not appear ...
    73 KB (10,966 words) - 01:24, 5 June 2022
  • ... are limited in the extent to which they can modify the UAF records of users in the same group; values such as privileges and quotas can be changed ...
    24 KB (4,006 words) - 09:56, 8 June 2019
  • ... proxy in, the proxy database. =Syntax= SYS$ADD_PROXY rem_node ,rem_user ,local_user , flags C Prototype: int sys$add_proxy (void rem_node, void rem ...
    6 KB (972 words) - 13:31, 8 June 2019
  • ... of the $CRMPSC_ 64 system services for OpenVMS Alpha.) On OpenVMS VAX, user programs are limited to an architectural maximum of two billion bytes (the ...
    122 KB (18,338 words) - 07:03, 23 December 2019
  • ... forced to change the password after logging in. If the user does not select a new password, the user is locked out of the system. To use this feature ...
    7 KB (1,029 words) - 07:49, 13 December 2019
  • ... flags DISFORCE_PWD_CHANGE flag , because if you don’t, the first time the user logs in they will not be prompted to change their password and when ...
    7 KB (1,059 words) - 17:12, 17 May 2023
  • ... name or UIC. You can use the asterisk wildcard to specify multiple user names or UICs. Full use of the asterisk and percent wildcards is permitted ...
    6 KB (895 words) - 12:38, 28 November 2019
  • ... call to $GETJPI belongs. This limit is set in the UAF record of the user who owns the process. The number is returned as a word decimal value. A value ...
    49 KB (8,143 words) - 07:47, 14 November 2019
  • ... which may be used for purposes that do not disclose the code to the user, such as the process termination code supplied to $DELPRC (but not the image ...
    29 KB (4,677 words) - 11:15, 23 March 2022
  • ... again. Once the specified number of attempts has been made without success, the user loses the carrier. As long as neither LGI_BRK_LIM nor LGI_BRK ...
    4 KB (639 words) - 04:18, 23 August 2018
  • ... to objects belonging to the subsystem. Users have no access to the ... to the subsystem. Once in the subsystem, users can work with the data files and ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... file that you want to overwrite has not been reached. You must have the user privilege VOLPRO or your UIC must match the UIC written on the volume. ...
    18 KB (2,869 words) - 14:52, 2 December 2019
  • ... PUBLIC KEY ---- Save the Notepad session in the .ssh folder for the user as OpenVMS.PUB . Open a CMD prompt window on the Windows 10 system to ...
    9 KB (1,393 words) - 13:25, 29 June 2023
  • ... , as supplied to the $CREPRC system service. - NEW_OWNER Specifies the user identification code (UIC) to be assigned to the created process, as ...
    14 KB (2,109 words) - 02:26, 26 November 2021
  • ... the address of a descriptor pointing to a buffer that contains an encoded user security profile. The usrpro argument eliminates the need to supply all ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... ''ADD new-record''' is an alias for COPY DEFAULT new-record: it creates a new user record with all information from the default record except for the ...
    3 KB (401 words) - 08:09, 7 June 2021
  • ... ; bear in mind that numbers in a UIC are octal). If MAXSYSGROUP is set to 10, then a user with a UIC of 1,4 or 10,3 will belong to System, whereas ...
    2 KB (409 words) - 13:01, 14 March 2019
  • ... run SYS$MANAGER:APACHE$CONFIG.COM. This will result in the creation of the APACHE$WWW user account and set it as owner to all of Apache’s files. It ...
    50 KB (7,396 words) - 17:34, 26 January 2022
  • ... sure that the system parameters will allow the settings chosen for the Tomcat user account. The table below shows the quotas that will be used in the ...
    49 KB (7,079 words) - 07:13, 20 October 2021
  • ... using CREATE/PROXY. To add a proxy, use ADD/PROXY remote_node::remote_user local_user/default. You can add as many proxies on the same local account ...
    2 KB (361 words) - 07:10, 28 February 2019
  • ... to use the F$GETJPI function to return the user name for the process number 3B0018. The user name is assigned to the symbol NAME. $ X=F$ENVIRONMENT( ...
    22 KB (3,044 words) - 17:48, 28 June 2019
  • ... be stored. The buffer is the 32- or 64-bit address of this user buffer. buffer_size SyservArgument byte count longword (signed) read by value ...
    2 KB (372 words) - 12:48, 28 November 2019
  • ... authorization file (UAF) record for the specified user. ;parameters : user_name:str : name of the user whose UAF record is modified : item_list:object ...
    37 KB (5,969 words) - 23:26, 6 July 2022
  • ... style="text-align:center;" String TRUE or FALSE to indicate whether the user requested that the specified job be retained in the queue if the ...
    33 KB (5,271 words) - 09:44, 13 September 2018
  • ... list means no access, so when you omit an access type for a user category, that category of user is denied that type of access. To deny all access to ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... and groups are created automatically by the AUTHORIZE utility when a new user or group is added. Alternatively, you can use /VALUE=UIC with the ...
    1 KB (227 words) - 12:38, 28 November 2019
  • ... maintaining and enforcing limits on the amount of disk space available to users on a public volume. =Disk quotas= On each volume or volume set where ...
    2 KB (347 words) - 13:40, 10 November 2019
  • ... to specify that the current day is to be considered a Secondary day for user login purposes. $GETSYI returns the number 0 if any override with the SET ...
    54 KB (8,797 words) - 19:32, 13 November 2019
  • ... command. It shares resources with the parent process and terminates when the user logs out of that process or the command submitted to PIPE is ...
    7 KB (909 words) - 09:35, 17 February 2022
  • ... WRITE qualifier to open an existing file. While the file is open, no other user will have access to it. When the file is first opened, the pointer is ...
    3 KB (505 words) - 09:41, 2 December 2019
  • ... (LES) address for asynchronous transfer mode (ATM). Usually the address is not user specified, and this qualifier is used only if you want a specific ...
    38 KB (4,756 words) - 06:27, 14 March 2019
  • ... (LES) address for asynchronous transfer mode (ATM). Usually the address is not user specified, and this qualifier is used only if you want a specific ...
    38 KB (4,668 words) - 10:58, 22 March 2019
  • ... github.com/mscdex/ssh2/blob/master/util/pagent.exe If nothing is specified, user will be prompted to enter the password during the connection attempt. ...
    9 KB (1,092 words) - 09:28, 12 February 2024
  • ... string length is set to a maximum of 255 characters. Once this bit is set, user name length is set to maximum of 255 characters. Even if this bit is ...
    3 KB (556 words) - 04:58, 9 April 2019
  • ... Override the expiration date on a tape or disk volume owned by another user Use the /FOREIGN qualifier to mount a Files-11 volume owned by another ...
    2 KB (262 words) - 08:31, 17 July 2019
  • ... field, the system will look for a file called LOGIN.COM in the user's Default directory default directory and if found execute the latest version ...
    2 KB (262 words) - 12:18, 28 November 2019
  • ... DECUServe On-Line The legendary user group started in March ... - GUID Partition Table https://habr.com/users/coderush/posts/ Nikolay Shley's Blog ...
    25 KB (3,483 words) - 09:59, 29 August 2022
  • ... Set WSQUOTA at the largest number of pages required by a program that the user will run interactively. Set WSEXTENT at the largest number of pages you ...
    3 KB (498 words) - 05:59, 3 July 2019
  • ... may access group objects via system protection IMPERSONATE may impersonate another user IMPORT may set classification for unlabeled object LOG_IO may ...
    7 KB (876 words) - 13:49, 14 December 2021
  • ... that has never been written A disk volume that is owned by your current user identification code (UIC) or by the UIC 0,0 A magnetic tape volume ...
    24 KB (3,938 words) - 14:47, 2 December 2019
  • ... template is used. The logical access bit must be clear for the class of user requiring access to the mailbox. The access bit must be clear for all ...
    15 KB (2,430 words) - 12:45, 28 November 2019
  • ... style="text-align:center;" String TRUE or FALSE to indicate whether the user requested that the specified job be retained in the queue if the ...
    24 KB (3,615 words) - 12:25, 26 November 2019
  • ... service has returned information about all job entries for the specified user (or the current user name if the QUI$_SEARCH_USERNAME item code is not ...
    47 KB (7,858 words) - 12:47, 28 November 2019
  • ... Access Control Entry that controls the type of access allowed to a particular user or group of users. An example of an Identifier ACE is as follows ...
    3 KB (477 words) - 12:34, 28 November 2019
  • ... be shared and thus have concurrent users or be unshared and have a single ... '''LOG_IO''' privilege allows the user's process to execute the Queue I/O ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... Change Mode to Kernel ($CMKRNL) system service. Grant this privilege only to users who need to gain access to protected and sensitive data structures ...
    928 bytes (141 words) - 07:26, 28 February 2019
  • ... and SYSNAM can set the system time. Grant this privilege only to users who need to execute privileged instructions or who need to gain access ...
    2 KB (364 words) - 07:30, 28 February 2019

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)