From: SMTP%"hasan@state.demon.co.uk" 1-JUL-1993 08:34:25.54 To: EVERHART CC: Subj: Re: a "new" bug; and a related question. X-Newsgroups: comp.os.vms From: hasan@state.demon.co.uk (Hasan Ali) Subject: Re: a "new" bug; and a related question. Distribution: world Organization: State Modules LTD Reply-To: hasan@state.demon.co.uk X-Mailer: Simple NEWS 1.90 (ka9q DIS 1.19) Lines: 23 Date: Wed, 30 Jun 1993 13:46:54 +0000 Message-Id: <741448014snz@state.demon.co.uk> Sender: usenet@demon.co.uk To: Info-VAX@kl.sri.com X-Gateway-Source-Info: USENET In article <1993Jun29.110116.1@woods.ulowell.edu> welchb@woods.ulowell.edu writes: >2) During the attempt to find remote or hidden causes for all this, I ran >into something new which I do not find in the gray wall. >$DIR/SEC SYSMGR.DIR yields > (APPLICATION,SIZE=%D28,FLAGS=%X0C03,ACCESS=%X000001DD,DATA=%X00000002, > %X00000200,%X000003D0,%XF83A8C00,%X0092605C) >This is due to that part of /SEC which is really /ACL. In no other place >where we have ACL's does that output take that form; it always looks like >the way the book shows. Does anyone wish to comment on the translation? >-- >Brendan Welch, UMass/Lowell, W1LPG, welchb@woods.ulowell.edu > You (or someone) has set up RMS file monitoring on this file (directory!) You can examine the output by $ mon rms/file=sysmgr.dir The whys and wherefores of the acl are not documented. -- Hasan Ali