What happens if you use different SETTING variables? Maybe setting DUMMY when
removing from B(1) interferes with the REMOVE from A. From your example it
appears to be REMOVE that's not working properly rather than SETREM.
- Original Message -
From: "Womack, Adrian" <[EMAIL PROTECTED]>
I have found what I believe to be a problem with implementing triggers
in UniVerse.
If I have a trigger on a file and a developer is trying to resolve a
problem in a program which happens to update/delete that file an issue
using 'RAID' the debugger ;-) When the developer steps over the
write
Here's a simple example:
DIM B(2)
A = "A":@VM:"B":@VM:"C"
B(1) = A
FOR X = 1 TO 3
SETREM 0 ON A
SETREM 0 ON B(1)
REMOVE A1 FROM A SETTING DUMMY
REMOVE B1 FROM B(1) SETTING DUMMY
CRT A1,B1
NEXT X
END
And this is the output...
A A
A B
A
<< Within UniVerse you can do the same thing. You can restrict user read,
write, delete access to the database either setting OS level file access or
by SQL security access. With the AUTHORIZE statement, you can allow
subroutines to have a different access rights. Thus from UniObects one can
In a message dated 6/9/05 5:08:55 PM Pacific Daylight Time,
[EMAIL PROTECTED] writes:
<< Within UniVerse you can do the same thing. You can restrict user read,
write, delete access to the database either setting OS level file access or
by SQL security access. With the AUTHORIZE statement, you
The original poster said "... I just log on, drop to DOS..." so he's on
a Windows platform?
I am on UV10.0.15 / Win2K3
Mike
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of John Jenkins
> Sent: Friday, 10 June 2005 10:20
> To: u2-users@listserver
Hi Martin
>The only way that I can see to close this hole is for UniObjects to have an
>option to restrict which operations the client end can request. At the
>highest level, this should restrict the client so that all he can do is
>call
>existing catalogued programs that are compiled with some sp
From: John Jenkins
> Try selecting with NO.INDEX selected
I did, but by that time it was acting normal every which way, so I
didn't learn anything.
> - and try it on each part file individually.
did, but see above.
> It could be the GTAR but I have seen oddities with one of:
>
> 1. A Index bas
Try selecting with NO.INDEX selected - and try it on each part file
individually.
It could be the GTAR but I have seen oddities with one of:
1. A Index based upon external data (e.g. a file xlate)
2. A partfile that has been populated before being made a member of the
distributed file so the hash
Big question:
What UV version and platform? Very relevant
JayJay
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
Just an FYI: MS SQL Server 2000 has a similar issue -- the user needs to
be set up in SQL and given access to the database, but does not have to
be set up on the server as a user.
Dick Kryka
Director of Applications
CCCS of Greater Denver, Inc.
Paragon Financial Services
303-632-2226
[EMAIL PROTEC
I will be out of the office starting 10/06/2005 and will not return until
16/06/2005.
If you need assistance with U2 or Red Brick related matters, please email
[EMAIL PROTECTED]
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
> Well, Mr. Phillips, I can't disagree with you. The scenario you
> describe is a classic concrete tunnel into the system not a "hole" at
> all!
The solution that I mentioned was how we made the equivalent functionality
of QM secure. I would really like to see UniObjects offer something similar.
EXECUTE/PERFORM, LOCATE()/LOCATE, many of the system variables and a lot of
the OS-level commands participate with these localized variables. I also
have one called OPENER that removes all of the verbose ELSE statements,
GET.WORK.FILE that creates a port-level WORK file on the fly, GET.IDS for
smal
In a message dated 6/9/05 8:54:44 AM Pacific Daylight Time,
[EMAIL PROTECTED] writes:
<< I create a separate program file that holds lots of subroutines that
represent
the differences between systems. For example (maybe not the best, but most
understandable), GET.PORT >>
Mark I have done the
Peter Ivanick wrote:
Ok, we've tracked this down further -- the forms which are having
trouble printing are using two subroutines my programmer's made (and
used successfully in lots of OS scenarios excepting Linux) which 1)
define a lot of printer control codes such as:
ESC = CHAR(27)
L
Well, Mr. Phillips, I can't disagree with you. The scenario you
describe is a classic concrete tunnel into the system not a "hole" at
all!
I'm just hoping that since I've managed to achieve the opposite (via
blind stupidity and bad luck) that perhaps this is all due to
inadequate documentation of
> I'm not so sure I would call this a security hole. If I could figure
> it out, it might just be a security feature in that one could shut
> down access via UniObjects for users who have no business accessing
> the system that way.
I go back to my original argument, perhaps explained more clearl
i agree that this sounds like a config problem and should pose no threat - but
the original problem sure does.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Don Kibbey
Sent: Thursday, June 09, 2005 11:29 AM
To: u2-users@listserver.u2ug.org
Subject: Re: [U2
Not that I'm the best at straddling different versions of MV or the underlying
OS, but here's a trick that I use for all of my varied clients.
I create a separate program file that holds lots of subroutines that represent
the differences between systems. For example (maybe not the best, but most
u
> Back before starting to use UniObjects, I remember reading something about
UniObjects not logging in like a normal user would log in. I didn't realize
that it meant UniObjecs was 'above the law' in terms of logins. That's a
potentially scary issue!
Sounds like people are beginning to grasp the
Have a look at your pam.config file. I'll bet that UniObjects is not
using the same mechanism to connect as a telnet connection does. That
could mean the OS is not locking down all means of connection when a
login goes rogue.
I'm more certain now that this is an issue of OS and documentation and
I think this is similiar to "nfauser", in that it needs a valid
unix account, but not an active account. If that makes sense. The security
would be on the application side. Basically the account would be for use
by the application, but not able to access the system directly.
"Dave T
I have the opposite. My UniObjects connections don't work, but the
very same user/password data will let me into a telnet session.
This all seemed to coincide with my screwing about with pam.conf so I
suspect in my case it's self inflicted. Until I get a chance to sort
it out, I'm using another
Yikes!!!
I just tried it in AIX 5.2/UniData v6.1.3 (Locking the account via smit) and
UniObjects [NOT .NET... yet!] was still able to connect and work perfectly.
Back before starting to use UniObjects, I remember reading something about
UniObjects not logging in like a normal user would log in.
From: Ray Wurlod
>Is anyone using (running) uvdlockd
yes.
>and, if so, does it clean up after these redundant disconnections?
No.
We cron uvlictool clean_lic -a to run every hour.
Actually, it's been this way since UV9.5 for reasons cited by others
(related to unirpc), but we're now on UV
And this is exactly it, and extreme thanks to all who helped out, and
especially to Jerry Banker who had the correct answer pretty much right
off the bat although the control character issues confused me into
thinking it was something else.
What was happening was a conflation of events: I coul
Does anyone out there have experience using a Terminal Server? Our
environment is very consistent - every user connects using either
Wintegrate or an RF scanning gun with vt100 emulation. The application is
Dataworks, database is Unidata.
Specifically, the users at some of our remote location
We have a similar issue here. I don't know how the rd and wt figures are
calculated, but I have always received results similar to yours. Just to
verify, change your loop from 100 to 1000, 5000 and 1. On our system,
we received the following:
100 loops - 60 wt
1000 loops - 600 wt
5000 lo
Adrian,
Could you provide an example program of it not working? Which version
of UV? I am unaware of the problem you describe.
There is a bug with REVREMOVE, (reverse-remove through a dynamic array).
It was partially fixed at 9.6 or 10.0 (I forget when), but not quite.
The list archives should c
here is something that popped up today.
hpux 11 / uv 10.1.8
I disabled my login account yesterday [ too many fat fingered login attempts
;-) ] and it has yet to be re-enabled , so I can't login to unix/universe
which is as it should be.
however , I have a dts package setup in sql server to pull a f
We noticed several problems related to licensing in 10.1.2, 10.1.4 and 10.1.6
(including uvlictool being broken!). I believe they have all been fixed in UV
10.1.8, we are currently testing it.
James Cowell
Database Development Team Leader
William Hill PLC
-Original Message-
From: David
[EMAIL PROTECTED] wrote:
> Dear Peter,
>
> As the lp concept of printing is to temporarily capture a file (frequently
> to the hard drive) as it is generated by an application, and then send it to
> a defined destination once the file is completely created, it is possible
> for system issues (such
I have uvdlockd is running however I have not changed the parameters from
the default. It has not cleaned the redundant disconnections.
Regards
David Jordan
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ray Wurlod
Sent: Thursday, 9 June 2005 6:34 PM
T
DISCLAIMER:
This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error, please delete it and notify
the sender immediately. Please note that there is no guarantee tha
Is anyone using (running) uvdlockd and, if so, does it clean up after these
redundant disconnections?
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
> > While delivering a Unidata System Administration course today
> > I noticed an interesting "feature" of udstat. I had a simple program the
> > contained a loop that performed one read and one write. The loop was
> traversed
> > 100 times.
> > udstat reported this as 200 reads and 600 writes. I
37 matches
Mail list logo