[Info-vax] OT: Review your password-checking $acm[w] calls

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Sat Oct 26 07:16:32 EDT 2013


In article <26bsja-8gn.ln1 at news.chingola.ch>, Paul Sture <nospam at sture.ch> writes:
>On Fri, 25 Oct 2013 13:41:06 -0400, Stephen Hoffman wrote:
>
>> On 2013-10-24 10:06:31 +0000, Stephen Hoffman said:
>> 
>>> The following is an OpenVMS Programming Public Service Announcement for
>>> both of the folks that are still reading this comp.os.vms newsgroup,
>>> still programming VMS, using sys$acm[w] to check the user passwords,
>>> please check your $acm[w] system service call source code...
>>> 
>>> If you neglected to include the logon type (ACME$_LOGON_TYPE) itemcode
>>> as network (ACME$K_NETWORK) — which requires the IMPERSONATE privilege;
>>> formerly known as DETACH — then your calls will work just fine in most
>>> conditions...
>> 
>> Additional recent experiences with $acm[w], via Jim Duff:
>> <http://www.eight-cubed.com/blog/archives/001271.html>
>
>From Jim's article:
>
>" And to make matters worse, OpenVMS Engineering still haven't fixed the 
>documentation feedback form that produces a page not found error when you 
>hit the submit button."
>
>Link:
><http://h71000.www7.hp.com/doc/fb_doc.html>

HP should hire CGI Federal to do their web site for better results!  <*ducks*>
-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

Well I speak to machines with the voice of humanity.



More information about the Info-vax mailing list