×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
There's a couple of ways to skin that cat.
1 - Monitor all access to that file that wasn't by a particular program.
ie: If all access to that file is supposed to be only by your "Application
Only" interface, then report all other accesses.
2 - Monitor a particular access, if they access this particular object
then alert...
1 - Would involve journal monitoring.
2 - Would involve monitoring "Exit Points". Like those that appear in
WRKREGINF.
For item 2 look at:
http://faq.midrange.com/data/cache/198.html
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.