× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Thanks everyone for your responses. I got what I was looking for.



From:
bpcs-l-request@xxxxxxxxxxxx
To:
bpcs-l@xxxxxxxxxxxx
Date:
05/13/2011 01:00 PM
Subject:
BPCS-L Digest, Vol 9, Issue 64
Sent by:
bpcs-l-bounces@xxxxxxxxxxxx



Send BPCS-L mailing list submissions to
bpcs-l@xxxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
http://lists.midrange.com/mailman/listinfo/bpcs-l
or, via email, send a message with subject or body 'help' to
bpcs-l-request@xxxxxxxxxxxx

You can reach the person managing the list at
bpcs-l-owner@xxxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of BPCS-L digest..."


*** NOTE: When replying to this digest message, PLEASE remove all text
unrelated to your reply and change the subject line so it is meaningful.

Today's Topics:

1. Re: BPCS Access by Program (Al)


----------------------------------------------------------------------

message: 1
date: Thu, 12 May 2011 18:58:52 -0500
from: "Al" <macwheel99@xxxxxxxxxx>
subject: Re: [BPCS-L] BPCS Access by Program

There's also programs a person has access to, under BPCS security rules,
but
they may have a hard time getting to menu where the program is located, so
they can launch it.

If you tell us why you need the info, maybe we can suggest other
solutions.

For example, you discovered you have been hacked, or keylogger got loaded
to
an employee PC, you need a list of what was accessible by the user-id
involved.

For example, something is seriously messed up, you trying to figure out
whose user-id could have done it, and the scope of the damage. UPI has
great solution tools, only if they were running at the time of the
mess-up.

For example, a super user suddenly left the company, due to illness, their
duties had not been cross-trained, you want to avoid that nightmare
happening again.

-----Original Message-----

Hi There,

Has any one written a script which can identify list of all programs a
user has access to? I would like to this for all active users.
We are on v 8.1


Thanks in advance for your help.


Sumit&nbsp;Rohatgi
Enterprise Applications Team Lead - Supply

Mother Parkers Tea & Coffee
p: 905-279-9100 ext. 2232
f: 905-279-9821

e:&nbsp;SRohatgi@xxxxxxxxxxxxxxxxxx





------------------------------


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.