heisterb@uiucuxe.cso.uiuc.edu (07/05/87)
[ love to eat them mousies, mousies what I love to eat... ] Depending on how restricted an access you want to give the captive users you could generate a new command table by removing the "forbidden" commands from dcltables.exe. Of course you need to prohibit access to the original dcltables... (I know a funny story about that!). Otherwise, just have the captive account command procedure read command lines, check that the command is "ok" and then execute it. Does that sound workable for you? heisterb@uiucuxe.cso.uiuc.edu
kai@uicsrd.UUCP (07/07/87)
/* Written 1:53 pm Jul 5, 1987 by heisterb@uiucuxe.cso.uiuc.edu in uicsrd:comp.os.vms */ [ love to eat them mousies, mousies what I love to eat... ] Depending on how restricted an access you want to give the captive users you could generate a new command table by removing the "forbidden" commands from dcltables.exe. Of course you need to prohibit access to the original dcltables... (I know a funny story about that!). Otherwise, just have the captive account command procedure read command lines, check that the command is "ok" and then execute it. Does that sound workable for you? heisterb@uiucuxe.cso.uiuc.edu /* End of text from uicsrd:comp.os.vms */