[Info-vax] login information capture
pcoviello at gmail.com
pcoviello at gmail.com
Wed Feb 19 16:25:49 EST 2014
it's fine as long as they fill it in I'm sure I wont have a problem! :-)
thank you!
On Wednesday, February 19, 2014 11:59:58 AM UTC-5, Stephen Hoffman wrote:
> On 2014-02-19 16:39:20 +0000, pcoviello at gmail.com said:
>
>
>
> > it looks like they could just hit return and not put anything in with
>
> > restricted on :-(
>
>
>
> The SYSUAF RESTRICT setting on the username involved has nothing to do
>
> with how much text might be input by the user. If any. That's
>
> completely independent.
>
>
>
> Even if you decide to test the text content or text length or other
>
> attributes, there's no reasonable way to differentiate whether the
>
> reason string is reasonable and semantically valid, or just random
>
> text. Well, short of performing grammar analysis or such -- simple
>
> Bayesian won't get you there -- and that sort of processing is a little
>
> much for a typical DCL procedure. Some reasons will be cryptic. Some
>
> humorous. Even grammar analysis would have trouble with "fx rx efi ipb
>
> vms boot err", which could be perfectly reasonable for some support
>
> vendor connecting into the server, for that matter.
>
>
>
> Included mostly for humor value, there's
>
> <http://www.commitlogsfromlastnight.com> -- same general problem arises
>
> there.
>
>
>
> The READ would need an /ERROR or /END_OF_FILE to specifically process
>
> ^Z input, as well.
>
>
>
> If you really want to know who is accessing and why, then you're likely
>
> headed for some form of two-factor authentication, and that's not what
>
> you had originally asked for.
>
>
>
>
>
>
>
> --
>
> Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list