Enhanced commit privileges: Stanislav Sedov (src, ports)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Enhanced commit privileges: Stanislav Sedov (src, ports)
# 1  
Old 08-25-2008
Enhanced commit privileges: Stanislav Sedov (src, ports)

ImageJLanguageLearn is a generic language course. It is based on Java and XML. You can define your own lessons in an easy way, and lessons are displayed in a graphical user interface. An editor is included for creating lessons.License: Free for non-commercial useChanges:
The printing functionality has been removed due to lack of use.Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

cvs[commit aborted]:'root is not allowed to commit changes'

Hi , can u please any one of you give solution for this .. when am tryring to commit files from the CVS in Myeclipse J2ee Environment . that i coundnt able to commit and getting the Following error message cvs :'root' is not allowd to commit files' am using redhat enterprise 5 Server . (1 Reply)
Discussion started by: rksubash
1 Replies
Login or Register to Ask a Question
privgrp(5)							File Formats Manual							privgrp(5)

NAME
privgrp - HP-UX group privileges DESCRIPTION
HP-UX allows subletting of limited superuser-like privileges to all users or to members of a particular group or groups. This capability is deprecated and only existing applications should use it. The newer fine-grained privilege facilities described in privileges(5) should be used by new applications. The header defines the following symbolic privilege names: and All but one of the group privileges are supported as fine-grained privileges and described in privileges(5). The one group privilege not supported as a fine-grained privilege is: Permits the use of the and system calls for changing respectively the real user ID and real group ID of a process (see setuid(2)). This behavior of is deprecated and only legacy applications should use it. Newer applications should use and respec- tively, to achieve the same effect. (No special privileges required.) The header defines two additional symbolic constants: defines the maximum number of groups with special privileges. Of this maximum, one is reserved for global privileges (granted to all processes) and the remainder can be assigned to actual group IDs. defines the size of the multi-word mask used in defining privileges associated with a group ID. The and commands and the and system calls may be used to define and query the privilege group associations. The group privileges are automatically initialized from the contents of (see privgrp(4)) at boot time. WARNINGS
This mechanism is deprecated and only legacy applications should use it. See privileges(5) for a description of fine-grained privileges. SEE ALSO
getprivgrp(1), setprivgrp(1M), chown(2), getprivgrp(2), lockf(2), mpctl(2), plock(2), pset_create(2), rtprio(2), rtsched(2), serialize(2), setgid(2), setuid(2), shmctl(2), privgrp(4), privileges(5). privgrp(5)