[Info-vax] OT: Review your password-checking $acm[w] calls
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Sat Oct 26 07:16:32 EDT 2013
In article <26bsja-8gn.ln1 at news.chingola.ch>, Paul Sture <nospam at sture.ch> writes:
>On Fri, 25 Oct 2013 13:41:06 -0400, Stephen Hoffman wrote:
>
>> On 2013-10-24 10:06:31 +0000, Stephen Hoffman said:
>>
>>> The following is an OpenVMS Programming Public Service Announcement for
>>> both of the folks that are still reading this comp.os.vms newsgroup,
>>> still programming VMS, using sys$acm[w] to check the user passwords,
>>> please check your $acm[w] system service call source code...
>>>
>>> If you neglected to include the logon type (ACME$_LOGON_TYPE) itemcode
>>> as network (ACME$K_NETWORK) â which requires the IMPERSONATE privilege;
>>> formerly known as DETACH â then your calls will work just fine in most
>>> conditions...
>>
>> Additional recent experiences with $acm[w], via Jim Duff:
>> <http://www.eight-cubed.com/blog/archives/001271.html>
>
>From Jim's article:
>
>" And to make matters worse, OpenVMS Engineering still haven't fixed the
>documentation feedback form that produces a page not found error when you
>hit the submit button."
>
>Link:
><http://h71000.www7.hp.com/doc/fb_doc.html>
HP should hire CGI Federal to do their web site for better results! <*ducks*>
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
Well I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list