- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: re: How are Process Names Generated?
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-22-2005 06:52 AM
08-22-2005 06:52 AM
re: How are Process Names Generated?
Kevin,
I would have entered this as a comment on your thread, but you closed it before I could enter it.
Generally, it is a not a good idea for processes to change their UICs as a matter of course. This requires the use of privileged facilities, which can only weaken the overall security of the system.
The security and other implications are seerious. In all the cases that I have seen, the same effects of changing the UIC can be achieved in a fully secure way, without the use of privileges, through the use of the appropriate ACLs.
I hope that the above is helpful.
- Bob Gezelter, http://www.rlgsc.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-22-2005 07:03 AM
08-22-2005 07:03 AM
Re: re: How are Process Names Generated?
you can now respond to closed threads.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-22-2005 07:24 AM
08-22-2005 07:24 AM
Re: re: How are Process Names Generated?
I hadn't noticed that. I have re-posted the comment to Kevin's thread.
Thanks for the pointer, it is appreciated.
- Bob Gezelter, http://www.rlgsc.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-22-2005 08:02 PM
08-22-2005 08:02 PM
Re: re: How are Process Names Generated?
so it's better you close this thread.
Antonio Vigliotti
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-22-2005 08:15 PM
08-22-2005 08:15 PM
Re: re: How are Process Names Generated?
Yes, I forgot to close this thread when I posted to the other thread yesterday. Thank you for reminding me.
- Bob Gezelter