Search results

Jump to: navigation, search
  • ... for file I/O. There are different Object access types set for each particular object; security alarms and audit can be enabled to track access to ...
    1 KB (205 words) - 12:57, 28 March 2019
  • ... that can be managed for protected objects of each class. class="wikitable" - Object class Access types - Capability Capabilities ...
    854 bytes (111 words) - 05:50, 23 August 2018
  • '''OBJECT''' is a group of Privileges privileges that has potential to compromise ... the process from reading an object (such as UIC Protection or ...
    610 bytes (88 words) - 18:00, 23 July 2019
  • ... the top of the ACL. - OSS$_ACL_READ Returns the portion of the object’s ACL to the buffer pointed to by the buffer address. - OSS$_ACL_READ ...
    13 KB (2,135 words) - 10:47, 3 February 2020
  • ... the buffer will be the same as the length of item_value . ;parameters : il:object : item list : item:int : item to add : item_value:str : value to add ...
    37 KB (5,969 words) - 23:26, 6 July 2022
  • ... or kernel mode or possess the AUDIT privilege. Usually, $CHKPRO generates an object access audit when an audit is required. The caller can specify the ...
    15 KB (2,536 words) - 09:56, 8 June 2019
  • ... on Ataxx, a popular arcade video game. It is a game of position and movement. The object is to have the most pieces of your color on the board at the ...
    228 KB (33,783 words) - 18:52, 12 July 2023
  • ... fied in network proxy authorization file - NSA$C_MSG_OBJ_ACCESS Object access attempted - OBJ_ACCESS Access attempted to create, delete, or ...
    14 KB (2,109 words) - 02:26, 26 November 2021
  • ... of the parent directory. SET SECURITY does not copy any ACE on the source object if the ACE holds the nopropagate attribute nor does it change any ACE ...
    8 KB (1,169 words) - 13:43, 3 December 2019
  • ... users, and to all other users. The system manager can protect system objects with access control lists (ACLs) that allow access to be granted or ...
    73 KB (10,966 words) - 01:24, 5 June 2022
  • ... an aligned object. Since the compiler determines the alignment of the dereferenced object from the type of the pointer, and the program is allowed to ...
    19 KB (2,839 words) - 12:30, 19 September 2023
  • ... ACE in the access control list (ACL) of an object. To audit all objects of a class, use the ACCESS keyword. - ALL Specifies all system events and ...
    8 KB (1,069 words) - 15:37, 11 December 2019
  • ... an application protected by normal access controls serves as a gatekeeper to objects belonging to the subsystem. Users have no access to the subsystem ...
    6 KB (949 words) - 14:04, 4 December 2019
  • ... Define the main target depending on the project type Define object dependencies '''NOTE''': For some languages the compilation order is important. ...
    8 KB (513 words) - 10:30, 20 August 2019
  • '''Default protection''' is the security profile of an object that the object gets when it is created unless a different security profile is specified ...
    3 KB (392 words) - 05:59, 25 February 2019
  • ... volumes Grant this privilege with extreme caution because it overrides all object protection. It should be reserved for use by well-tested, reliable ...
    3 KB (433 words) - 07:24, 28 February 2019
  • ... audit log BUGCHK may make bug check log entries BYPASS may bypass all object access controls CMEXEC may change mode to exec CMKRNL may change mode to ...
    7 KB (876 words) - 13:49, 14 December 2021
  • ... a remote node failed for one of the following reasons: The object requested does not exist. The access control information specified is invalid. ...
    122 KB (18,338 words) - 07:03, 23 December 2019
  • ... The options include: DEBUG excludes local symbol table information in the object file for use with the debugger. If the /DEBUG qualifier is also ...
    4 KB (529 words) - 09:22, 8 February 2023
  • ... that the process uses a vector instruction =Permanence of the object= The capability object's security profile needs to be reset each time the ...
    1 KB (232 words) - 05:55, 23 August 2018
  • ... the table below). These flags are used to define the scope of the object search specified in the call to the $GETQUI system service. Note that the ...
    7 KB (1,022 words) - 15:35, 26 November 2019
  • ... system logical names in the name table - SYSPRV Access objects through the system protection field - UPGRADE (privilege) Write to ...
    976 bytes (135 words) - 18:11, 23 July 2019
  • ... not. '''Owner''' refers to users whose UIC exactly matches that of the object's owner. '''Group''' refers to users whose UIC group matches that of the ...
    2 KB (409 words) - 13:01, 14 March 2019
  • ... class, the service determines whether you enabled auditing for the associated object access event. When an alarm or an audit is required, $CHKPRO ...
    5 KB (781 words) - 09:55, 12 December 2019
  • ... to that device; therefore, it is necessary to reset the specific object profile by using the DCL command SET SECURITY (see “Modifying a Security ...
    10 KB (1,603 words) - 08:47, 3 February 2020
  • ... and the dependencies between them. You can also list the files and other objects that make up each product, or the history of installation and upgrade ...
    7 KB (1,065 words) - 09:26, 15 February 2019
  • ... job trees - 4 Allows security profile changes to protected objects on a local node when the object server is absent and cannot update the cluster ...
    3 KB (446 words) - 16:05, 1 July 2019
  • ... an options file. Because a symbol table file is processed as an object module, it requires no identifying qualifier. - Options file .OPT Text ...
    4 KB (611 words) - 09:40, 6 July 2023
  • ... to it. On x86-64, there is no short data. All data defined in an object module will go where the module goes (except the defining PSECT, which is ...
    9 KB (1,472 words) - 10:33, 22 November 2023
  • ... when the end of the list is reached. A wildcard can represent only object names, not object numbers. Here is how the queue context advances when using ...
    16 KB (2,584 words) - 06:39, 4 September 2018
  • ... of the list is reached. A wildcard can represent only object names, not object numbers. flags '''DISPLAY_ENTRY''' can be used with the following ...
    7 KB (1,084 words) - 14:18, 26 November 2019
  • ... a default protection code through a directory structure Identifier ACE for object access control Creator ACE to set the ownership access ...
    575 bytes (85 words) - 12:34, 28 November 2019
  • ... : $ create/directory jdoe.sub.sub2 $ show security jdoe sub.dir DSA1: 000000.JDOE SUB.DIR;1 object of class FILE Owner: WRITERS,JDOE Protection ...
    5 KB (725 words) - 05:42, 25 February 2019
  • ... is referenced by an event flag number. =Naming rules= The name of the object is whatever character string was supplied as an argument to the Associate ...
    3 KB (466 words) - 05:59, 23 August 2018
  • ... is a privilege that gives the process the access rights provided by the object's system protection field when the process;s group matches the group of ...
    1 KB (236 words) - 10:02, 2 March 2019
  • ... on OpenVMS I64 systems, with some exceptions. - Checksum utility CHECKSUM/OBJECT command enhanced for I64 objects. - DCE RPC Supports both ...
    10 KB (1,482 words) - 08:05, 2 December 2019
  • ... , SYSPRV belongs to the All group of privileges. Even if an object is protected against system access, a process with SYSPRV privilege can change ...
    3 KB (446 words) - 04:53, 21 July 2019
  • ... which permits writing and deleting, READALL permits only the reading of objects and allows updating of such backup-related file characteristics as the ...
    765 bytes (106 words) - 18:04, 23 July 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    2 KB (323 words) - 09:14, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    6 KB (840 words) - 10:22, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    24 KB (3,615 words) - 12:25, 26 November 2019
  • ... The object-id argument specifies either the name or the number of an object (for example, a specific queue name, job name, or form number) about which ...
    4 KB (640 words) - 13:25, 26 November 2019
  • ... The item that can be specified with TRANSLATE_QUEUE is "QUEUE_NAME". Object Id Object Id is the logical name that you wish to translate. =Example ...
    578 bytes (88 words) - 14:06, 26 November 2019
  • ... file-spec ,... The MESSAGE command compiles a .MSG source file into an object modules. The message object module can then be linked with the facility ...
    1 KB (153 words) - 11:45, 19 July 2023
  • ... Access Control Lists''', or '''ACLs''' ("ackles"), are a way to control access to objects on an OpenVMS system by granting various types of access to ...
    548 bytes (85 words) - 09:23, 18 September 2023
  • ... identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...
    3 KB (380 words) - 12:35, 28 November 2019
  • ... an OpenVMS system to access system objects and resources. Privileges are stored in ... : Potential to compromise object security ALL privileges ...
    1 KB (156 words) - 09:26, 18 December 2018
  • ... assembler - .MSG Source file that specifies the text of messages - .OBJ Object file created by a language compiler or assembler - .OLB ...
    4 KB (600 words) - 07:09, 19 December 2018
  • '''VOLPRO''' is a Privileges privilege in the Objects group that allows the user to perform various operations on Volume volumes . The VOLPRO ...
    2 KB (262 words) - 08:31, 17 July 2019
  • ... the process with the same group as the object owner the access rights provided by the object's system protection field. See UIC Protection for ...
    525 bytes (76 words) - 16:06, 23 July 2019
  • ... information. - LIB$GET_ACCNAM Get access name table for a security object identified by name. - LIB$GET_ACCNAM_BY_CONTEXT Get access ...
    14 KB (2,134 words) - 08:42, 13 November 2019
  • ... ://github.com/oveas/OMI Github - OmniORB for OpenVMS omniORB is a CORBA object request broker for C++ and Python. It is very fast, robust, and ...
    28 KB (4,116 words) - 11:35, 19 October 2021
  • ... Images without activation information are not defined in the OpenVMS I64 object language. As a result, the OpenVMS I64 linker does not create this ...
    2 KB (298 words) - 08:54, 6 July 2023
  • ... another user NETMBX may create network device SYSPRV may access objects via system protection TMPMBX may create temporary mailbox Process rights ...
    49 KB (7,079 words) - 07:13, 20 October 2021
  • ... unit, data type, datetime conversion, returning information about system objects and establishing context for such information, etc. Conversion and ...
    6 KB (881 words) - 17:24, 7 January 2020
  • ... identifiers, are labels used to grant users access to system objects (as an alternative to UIC access ). They are stored in RIGHTSLIST.DAT ...
    6 KB (895 words) - 12:38, 28 November 2019
  • ... be sent to all security Operator terminal operator terminals whenever the object is successfully or unsuccessfully accessed in the specified ways. ...
    3 KB (473 words) - 12:35, 28 November 2019
  • ... System security log file system security log file whenever the object is successfully or unsuccessfully accessed in the specified ways. A message ...
    3 KB (429 words) - 12:34, 28 November 2019
  • ... Identifier Specifies a user or groups of users whose access to an object is defined in the ACE. A system manager creates or removes Identifier ...
    3 KB (477 words) - 12:34, 28 November 2019
  • ... that the system-supplied command procedures used to implement network objects function properly. /DEVICE specifies the device that holds the ...
    8 KB (1,100 words) - 14:43, 3 December 2019
  • ... to the SCSI driver (GKDRIVER) - Process a diagnostic buffer $QUI request to a TU58 magnetic tape (TUDRIVER) - Category:Objects Privileges
    821 bytes (121 words) - 07:33, 28 February 2019
  • ... mandatory access controls. The privilege lets a process write to an object of lower secrecy, in violation of the Bell and LaPadula confinement ...
    358 bytes (50 words) - 07:34, 28 February 2019
  • ... Thus, there are no restrictions on the files, directories, and other objects to which a detached process can gain access. The IMPERSONATE privilege ...
    1 KB (211 words) - 10:06, 2 March 2019
  • ... SET VOLUME/ACCESSED, MOUNT/ACCESSED, $MOUNT - Connect to an object while executor state is restricted - Read network event-logging buffer ...
    6 KB (963 words) - 11:28, 2 December 2019
  • ... , the updated files will be uploaded to the OpenVMS system. Previously created object and listing files (.OBJ, .LIS) will be removed from the OpenVMS ...
    5 KB (708 words) - 04:10, 10 July 2020
  • ... Project types ''executable'' - executable image is created ''library'' - object library (OLB) is created ''shareable'' - shareable image is ...
    3 KB (433 words) - 08:37, 20 March 2020
  • ... the project is built for debugging purpose. '''outdir''' - Output directory where object, listing and executable files will be stored when built. Is ...
    5 KB (676 words) - 19:33, 24 June 2022
  • ... NO Configures certain network nodes as name servers that associate objects with network names. - LATCP Local Area Transport Control Program ...
    13 KB (1,893 words) - 08:30, 17 July 2019
  • ... memory, measured in pagelets, that can be associated with a single buffer object created by a process in user mode on Alpha and Integrity ...
    392 bytes (60 words) - 09:40, 9 April 2019
  • ... that can be used in place of another name to represent system objects such as files, directories, devices, or queues. For example, you might assign ...
    3 KB (515 words) - 08:45, 6 July 2023
  • ... definition will be used. =Security= A logical name table is also a protected object class, which means that a protection code can be defined for ...
    2 KB (386 words) - 13:18, 2 June 2019
  • ... Access a MAIL maintenance record Modify a MAIL forward record Declare a network object Create an IPC association With CMKRNL, add or remove an ...
    1 KB (187 words) - 19:09, 3 June 2022
  • ... delimited with a space. Parameter The purpose of parameters is to provide objects for the command verb to perform operations on (such as symbols ...
    5 KB (718 words) - 08:05, 2 December 2019
  • ... mandatory access controls. The privilege allows a process to write to an object of higher integrity. This privilege is reserced for enhanced security ...
    393 bytes (58 words) - 15:24, 23 July 2019
  • ... mandatory access controls. The privilege allows a process to write to an object of higher integrity. This privilege is reserved for enhanced security ...
    280 bytes (40 words) - 18:07, 23 July 2019
  • ... reading authorization file - PCB$V_NETWRK Process is a network connect object - PCB$V_NOACNT No accounting for process - PCB$V_NODELET ...
    49 KB (8,143 words) - 07:47, 14 November 2019
  • ... , QUI$_SEARCH_NUMBER, and QUI$_SEARCH_USERNAME. These item codes specify the object name or number for which $GETQUI is to return information and the ...
    47 KB (7,858 words) - 12:47, 28 November 2019
  • ... by all equivalence strings; when it is used in a command like CREATE, the object is created at the first available location. In the following example ...
    1 KB (192 words) - 08:30, 28 November 2019
  • ... CHECKSUM filespec Qualifiers /ALGORITHM /ALPHA /FILE /I64 /IMAGE /OBJECT /OUTPUT /SHOW /VAX Category:DCL Commands Category ...
    520 bytes (71 words) - 13:58, 2 December 2019
  • ... memory. =Syntax= SHOW MEMORY Qualifiers /ALL /BITMAP /BUFFER_OBJECTS /CACHE /EXACT /FILES /FULL /GH_REGIONS /HIGHLIGHT /OUTPUT ...
    398 bytes (50 words) - 10:54, 3 December 2019
  • ... Syntax= SET COMMAND filespec ,... Qualifiers /DELETE /LISTING /OBJECT /OUTPUT /REPLACE /TABLE =See also= Template:UtilitiesI ...
    364 bytes (46 words) - 11:53, 3 December 2019
  • ... security alarms). The audit server process is started automatically; cluster object support requires the audit server. To shut down security auditing ...
    2 KB (378 words) - 09:56, 23 August 2023
  • ... in an ACL is important. ACEs granting or denying access to an object for specific users must appear before ACEs identifying broader classes of users. ...
    538 bytes (86 words) - 19:03, 12 December 2019
  • ... invokes the ACL Editor utility which allows you to edit the Object Class object's ACL . Category:DCL Commands Category:Security
    200 bytes (28 words) - 19:04, 12 December 2019
  • ... C++ for OpenVMS is a native programming language product, which generates highly optimized object code. VSI C++ for OpenVMS is based on the ANSI/ISO ...
    2 KB (339 words) - 08:42, 4 April 2020
  • ... will be built and linked in the executable image '''library''' - object library (OLB) will be created '''shareable''' - extension will create ...
    23 KB (3,451 words) - 06:37, 15 December 2021
  • ... on a "description file" (or "makefile") you create that lists the sources and objects of a system and the dependencies between them. MMK is similar in ...
    432 bytes (70 words) - 12:20, 24 January 2023
  • ... ''' controlling versions of code ('''generations''') manipulating '''groups''' of objects as a unit manipulating versions of the entire system ...
    9 KB (1,304 words) - 12:56, 19 December 2022
  • ... . Choose Convert inherited permissions into explicit permissions on this object when prompted. Remove all permissions from the file except for ...
    9 KB (1,393 words) - 13:25, 29 June 2023