1
0
mirror of synced 2026-01-12 00:42:56 +00:00
Interlisp.medley/lispusers/NSPROTECTION.TEDIT
2023-11-22 22:05:26 -08:00

12 lines
31 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

en·vÅos NSPROTECTION
2
4
1
NSPROTECTION
1
4
By: Bill van Melle (vanMelle@Xerox.com)
INTRODUCTION
The module NSPROTECTION provides a tool that enables you to easily change the protection of files and directories on Xerox NS file servers.
To install the module, load the file NSPROTECTION.LCOM. Also, Your NS file server must be running Services release 10.0 or later.
THE PROTECTION MECHANISM
An NS File Server maintains a protection for each file and (sub)directory on the server. In most cases, the protection is not specified explicitly, but rather is inherited from a file's parent directory, making it easy to maintain consistent protection over an entire branch of the file system hierarchy.
The protection is specified as a set of pairs <access rights, name>. The name can be the name of an individual user or a group. The name can also be a pattern of the restricted form *:domain:organization, *:*:organization, or *:*:*. The access rights granted to any particular user are the most general of those in the pairs that match the user's name (by exact match, pattern or membership).
The following five kinds of access rights are independently specified (the term "file" here can also denote a directory in the places where that makes sense):
Read The user may read the file's content and attributes. In the case of a directory, the user may enumerate files in it.
Write The user may change the file's content and attributes, and may delete the file. In the case of a directory, the user may change the protection of any of the directory's immediate children.
Add (Applies only to directories) The user may create files in the directory (i.e., add children).
Delete (Applies only to directories) The user may delete files from the directory (i.e., remove children).
Owner The user may change the file's access list.
In the case of directories, it is also possible to independently specify the directory's own protection and the protection that its children inherit by default. In most cases, the latter simply defaults to the former, and it is usually best to keep it that way for simplicity. However, there might conceivably be cases where, for example, you would want a user to be able to read the files in a directory, but not be able to enumerate it, or vice-versa.
Note that there can be problems when giving a more lenient protection to a file or directory than to its parents, depending on what software is going to be used to gain access to the file. For example, if your default directory protection grants access only to you, and you want to allow a user to read a particular file stored in your directory, then you can change the protection on just that file to allow Read access. However, the user will have to know the exact name of the file in order to read it, since she won't be able to enumerate the directory to search for the file. Specifying the exact file name works fine from Lisp, but other software that gets to a file by starting at the top and working its way down through the hierarchy would be unable to get to the file.
USER INTERFACE
To use the tool, select "NS Protection" from the background menu (if your menu has a "System" item, it's a subitem underneath it), or call the function (NSPROTECTION). You are prompted for a place to position the tool's window. Be sure to leave space below the window for the protection information that will follow.
`ÃhÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÀ`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿßÿÿÿÿÿÿûÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûîÀÛÿÁÿþÿÿ»ÿÿà?ÿïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàùí÷ßûÿÞÿþÿÿ¿ÿÿýÿÿïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàúíÿßÛ<C39F>ÞÓ ‡GýððïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûnÁÛwÞÊöîÝ»{;ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûoïßÛÁÞöàß»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàû¯÷ßÛßÞöïß»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûÍ÷ßÛwßÞöîÝ»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûîßÛ<C39F>ßß1ãˇ{ýððïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÀ`À`À`À`À `ÃÌÀ|`À?0À`Æ À``1€0À`Æ<0F>30Ç™˜`ûïfñóæÌ¾>x0Ï}ó7ð`Ìٳ0ÌÙ˜xíŽf‘Û¶ÌŒØÌ0Ù°`ÁÌÙŸàÏÏð`ÍŒlÏØÌ0ß°û6À`ÀlÙŸàÌð`ÍŒ<ù6xlÌ0Ø1`ÀlÙŒÀÌ``ÍŒ8
Û¶plÌ1˜1`ÇÌÏ ÀÇÆ`|Ìì
óæ0ÇÎx?°ùöp`À0ƒ``À0ƒ``ÀàƒÀ`À`À`À`À`ÀÀ`Çà<öÀÂp`Á€"À¢ˆ`ÁŒß0"ZXtñâÇŽØÀ¢9رB`ÁŒÝ³0"bd„ˆlØðÀE<04>&dŠÉ$`Á<>™¿<BD„ˆòoØàäDù<44>‰$`Á‡™° BD„‰lðŠ@ªR$D€A`Á‡° BD„‰2†lØŠ@DRdD€@ˆ‰`Áƒ0 BDtðÒögÎÌÀ†<D1¤D{€p‰`À0À`À`À``À`À`À`À`À`Æ00`Æ00`Æ1ãüÀ`Çó60À`Æ330`Æ31°`Æ31°`Æ1çÀ`ÀÀ`À`À`À`À`À`À`À°`Çã`Æ0`0`Æ{a³Æ`Æw}¶f`Æfa·à`Æfa¶`Æ3fa¶`Çãfa³æ`À`À`À`À`À`ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿà
The tool window has four command buttons across the top, two switches labeled Type and Check, and two fill-in fields for the host and file name. Holding a mouse button down over any of these items for a couple of seconds will display a help message in the prompt window.
To view or change the protection of a file or directory, first fill in the Host and Dir/File fields. You can edit these fields by clicking with the mouse anywhere inside the existing text (if any), or by clicking with the LEFT button on the boldface label. If you click with RIGHT on the label, then any existing text is first erased. Typing the Next or Return key moves to the next field. [See the FreeMenu documentation for more information about text editing.]
You can either enter the host and directory separately, e.g.,
Host: Phylex
Dir/File: Carstairs>Lisp
or enter a file name in the usual Lisp syntax in the Dir/File field, e.g.,
Host:
Dir/File: {Phylex:}<Carstairs>Lisp>
This latter form is intended to make it easy to copy-select the name of the directory or file from another source, such as a FileBrowser window; the host in the full name overrides any name in the Host line.
To see the protection of a file or directory, click on the command Show. The protection is displayed as a series of editable one-line windows beneath the main window. In each line is a set of access rights and a Clearinghouse name or pattern to which those rights are granted; for example,
`äÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÀ`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`À`ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿßÿÿÿÿÿÿûÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûîÀÛÿÁÿþÿÿ»ÿÿà?ÿïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàùí÷ßûÿÞÿþÿÿ¿ÿÿýÿÿïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàúíÿßÛ<C39F>ÞÓ ‡GýððïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûnÁÛwÞÊöîÝ»{;ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûoïßÛÁÞöàß»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàû¯÷ßÛßÞöïß»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûÍ÷ßÛwßÞöîÝ»{{ýïooÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàûîßÛ<C39F>ßß1ãˇ{ýððïÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÀ`À`À`À`À `ÃÌÀ|`À?0À`Æ À``1€0À`Æ<0F>30Ç™˜`ûïfñóæÌ¾>x0Ï}ó7ð`Ìٳ0ÌÙ˜xíŽf‘Û¶ÌŒØÌ0Ù°`ÁÌÙŸàÏÏð`ÍŒlÏØÌ0ß°û6À`ÀlÙŸàÌð`ÍŒ<ù6xlÌ0Ø1`ÀlÙŒÀÌ``ÍŒ8
Û¶plÌ1˜1`ÇÌÏ ÀÇÆ`|Ìì
óæ0ÇÎx?°ùöp`À0ƒ``À0ƒ``ÀàƒÀ`À`À`À`À`ÀÀ`Çà<öÀÂp`Á€"À¢ˆ`ÁŒß0"ZXtñâÇŽØÀ¢9رB`ÁŒÝ³0"bd„ˆlØðÀE<04>&dŠÉ$`Á<>™¿<BD„ˆòoØàäDù<44>‰$`Á‡™° BD„‰lðŠ@ªR$D€A`Á‡° BD„‰2†lØŠ@DRdD€@ˆ‰`Áƒ0 BDtðÒögÎÌÀ†<D1¤D{€p‰`À0À`À`À``À`À`À`À`À`Æ00âð 9ƒ>`Æ00ˆ`Æ1ãüÀÈQȈˆãŽ<YÖP<>E `Çó60À$%ñbP<>E<`Æ330â$“â‘óBˆ<>) `Æ31°"<00>"Bø<>) `Æ31°#<00>&BA `Æ1çÀ!舄÷9>`ÀÀ`À`À `À`À`À`À`À°`Çã`Æ0`0`Æ{a³Æ8<[œñ-ÀàsÀp`Æw}¶fÀd 2 `Æfa·àÀCy!€b `Æfa¶8"@ˆ‰ @à‚ p`Æ3fa¶&@ˆ™ G#€`Çãfa³æGi#€úãÀ`À`À`À`À`À`ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿà ŸÿÿþÿÿÁÿÿüÿüÿÿø?ÿ€ ŸÿÿúÿÿÁÿûôÿôÿÿø?ö€  <00>ÿÿú ýþÁïûôÿø=ö€ pà ˜ —ÿú <0B>þÁïûô¿ô¿ÿø=ö€0 ˆ2 —qà<0B>¤A×ÄÜt×v˜:ö€0#9cÅ<63>sž%¸ˆŽ8ãÅ<C3A3>aR <00>îýº
kžÁ×»tÛ´×vh:ö€|ñ€$L<><11>&AL<>&@<40>A&! –àáº
k¾Á»»tØ4Ú®è7v€1™€$H<>äAÈa$0 1ñä!ˆ —oݺ
k¾Áƒ»tÛôÚ®è0v€1˜$H$AH$<08> $!ˆ —oÙº÷¾Á}»t»ô½Þè/¶€1˜$H“d@ˆÈ$<08> d!D —°åÂ÷¿}Ä|4}Þè/¶€1˜È<C383>
¤@p€ãHàÍ$pˆOpñ¤Cà ŸÿÿþÿÿÁÿÿüÿüÿÿø?ÿ€ñ€ ŸÿÿþÿÿÁÿÿüÿüÿÿø?ÿ€ ŸÿÿþÿÿÁÿÿüÿüÿÿø?ÿ€ ŸÿÿþÿÿÁÿÿüÿüÿÿø?ÿ€ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿà Ÿÿÿþÿÿü Ÿÿÿúÿûô   <00>ÿÿúïûô À xÁŸ —ÿúbïûô@@ 0 D Á<> —qÃÂb[<5B>×Ä#ˆ(‰` 0ÈN#<23>-ÄDqÇ(@¢<> <00>îýº”a×»t$H(‰<> |ñ€‚‚$$$H2<08>1 ˆ(@¢ž –àẔA»»t%Q1™€b$äŸ$HŸ!€Hù<48><C3B9>!€D@”<> —oݺ”Aƒ»t$%Q1˜$<04>$H<> @D€H!€|@”<> —oÙºA}»tDB!I1˜$"$H<> @D€H!€‚ ˆ<> —°åÂ@Á}ăÈ!I1˜úãÇÁã#<23>#„B{‡<> 舂ˆŸ Ÿÿÿþÿÿüñ€ Ÿÿÿþÿÿü Ÿÿÿþÿÿü Ÿÿÿþÿÿü ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿàÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿà Ÿÿÿþ Ÿÿÿú  <00>ÿÿú ¨˜ —ÿúb@@ 0p2 —qÃÂb[€(<x#ˆ(‰` 0pˆŽ8ãÅ<C3A3>aR <00>îýº”a(Dˆ$H(‰<> |ñ€ˆ<E282AC>A&! –àẔADDˆ%Q1™€ 1ñä!ˆ —oݺ”A|Dˆ$%Q1˜<08> $!ˆ —oÙºADˆDB!I1˜<08> d!D —°åÂ@À‚<xƒÈ!I1˜ˆOpñ¤Cà Ÿÿÿþñ€ Ÿÿÿþ Ÿÿÿþ Ÿÿÿþ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿà
The highlighted buttons indicate which of the five access rights (Read, Write, Add, Delete, Owner) are granted to the name on the right. If the displayed protection was inherited from its parent subdirectory, rather than having been explicitly set, this fact is noted in the prompt window.
To change the protection of a file or directory, set up the protection entries as desired, then click on the command Apply. The usual procedure is to use the Show command to see the current protection, then edit one or more entries. Clicking on one of the first five buttons toggles it; clicking on All either sets all five (if All was previously unhighlighted) or clears all five. In addition, setting either Write or Add also sets Read, since they are of little use without read access (you can, however, clear Read if you really meant it). The name following to is edited in the same manner as the Host and Dir/File items above. As with most other places in the system, the name you type can omit the domain and organization, in which case the tool will fill in the local defaults; you can also use nicknames, which will be replaced by the Clearinghouse full names (assuming checking is on).
To add an additional entry, click on the command New Entry. This adds a new line to the existing set of protection entries, which you can edit as appropriate. To remove a set of access rights completely for an existing name, either clear all five access buttons (most easily done by clicking once or twice on All), or clear the name from the to field (by clicking on it with the RIGHT mouse button). Any such cleared lines will be removed by the Apply command.
You can also change the protection of a file back to "default" by clicking on the command Set to Default. Following this command, the protection of the specified file is inherited from its parent directory. This is usually the best way to "undo" a changed protection, because then any changes to the protection of its parent, or parent's parent, etc., will have the expected effect on all its children.
For the Apply and Set to Default commands, you may also specify a group of files, rather than a single file, by giving a file patternÿÿï%a name with asterisks serving as wild cards to match zero or morÿe characters. Any pattern acceptable to the File Browser can be used. The tool enumerates the specified set of files and applies the specified protection to each. The enumeration is made to all levels (infinite depth), so affects files both in the immediate directory and also in its subdirectories, and subdirectories of those, etc. The enumeration does not, however, include the top-level subdirectory itself; e.g., "<Carstairs>Lisp>*" matches all files (including subdirectories) anywhere in the directory <Carstairs>Lisp>, but does not include <Carstairs>Lisp> itself.
Note that applying a protection to a directory is different from applying the same protection to the files in it, because of defaulting. If you apply a protection to <Carstairs>Lisp>*, it changes the protection of every file currently in the directory, but any new files added after the change still inherit the protection of the directory <Carstairs>Lisp>. On the other hand, applying a protection to the directory <Carstairs>Lisp> itself affects all current and future files in the directory, except any files that already have an explicit protection currently set. To reduce confusion, it is thus preferable to apply protections to subdirectories, rather than individual files, if you want to control a whole group of files. If you have a subdirectory containing files of miscellaneous protection that you would like to make uniform, the best procedure is to set the desired protection on the subdirectory itself, and then use the Set to Default command with a pattern (e.g., <Carstairs>Lisp>*) to reset all the individual files to defaulted.
The Apply command looks up in the Clearinghouse each of the names in the individual protection entries to make sure that they are valid, and replaces aliases (nicknames) with the canonical names. It then tells the file server to change the protection as indicated. The extent to which the Apply command checks names is controlled by the Check item in the second line of the tool window. It has four possible settings:
New Names Only This is the default setting. The tool checks any names that you have entered or changed, but assumes that names returned by the Show command were correct.
All Names The tool checks all names, regardless of source. You might want to do this to convert an existing protection entry into canonical form, or check that all the names are still valid.
Never The tool never checks names; it assumes you meant exactly what you typed. You might want this setting, for example, if one of the names you are entering is registered only in a distant Clearinghouse not currently accessible.
I really mean it Not only does the tool not check the names, it also doesn't balk if you tell it to take certain unlikely actions, such as changing a top-level directory to default protection, setting a completely null protection, or setting a protection in which nobody has Owner rights (which means the protection can only be changed by someone with Write access to the parent, if any). This setting is "one-shot"ÿÿï%it reverts to "ÿNew Names Only" after you issue the next command.
The Type item in the second line of the tool window controls which of a directory's two protection attributes is displayed or set. The initial setting is "Principal" and is the one that should normally be used (it coincides with the Lisp file attribute PROTECTION, or "Access List" in NS Filing parlance). The other setting is "Children Only". When the protection type is set this way, the tool deals with the protection that is inherited by default by the directory's children, the attribute called "Default Access List" in NS Filing parlance. Ordinarily, this attribute is defaulted, in which case the directory's principal protection is also used as its children's default protection. Using the Apply command changes the Default Access List to the value you specify; using the Set to Default command changes it back to defaulted. The Show command displays the directory's Default Access List if it has one; otherwise, it displays the principal protection and notes this fact in the prompt window.
The Type item is irrelevant for non-directory files (and, in fact, the tool sets it back to "Principal" if it has been changed). When the file is a pattern, the tool always sets the Principal protection; in the case of any subdirectories matching the pattern, it sets the Principal protection to that specified in the window and the Default Access List to "default".
As an additional convenience feature, when you request to Show the "Principal" protection of a top-level directory, the tool also displays in the prompt window the directory's current page usage and allocation.(LIST ((PAGE NIL (PAPERSIZE Letter FOLIOINFO (ARABIC "" "") STARTINGPAGE# 164) (0 0 612 792) ((FOLIO NIL (PARALOOKS (QUAD CENTERED) CHARLOOKS (SUPERSCRIPT 0 INVISIBLE OFF SELECTPOINT OFF PROTECTED OFF SIZE 10 FAMILY MODERN OVERLINE OFF STRIKEOUT OFF UNDERLINE OFF EXPANSION REGULAR SLOPE REGULAR WEIGHT MEDIUM INVERTED OFF USERINFO NIL STYLE NIL) FORMATINFO (ARABIC "" "")) (174 42 288 36) NIL) (HEADING NIL (HEADINGTYPE RUNNINGHEAD) (84 744 528 36) NIL) (TEXT NIL NIL (84 96 456 600) NIL))) (PAGE NIL (PAPERSIZE NIL . LETTER) (0 0 612 792) ((FOLIO NIL (PARALOOKS (QUAD CENTERED) CHARLOOKS (SUPERSCRIPT 0 INVISIBLE OFF SELECTPOINT OFF PROTECTED OFF SIZE 10 FAMILY MODERN OVERLINE OFF STRIKEOUT OFF UNDERLINE OFF EXPANSION REGULAR SLOPE REGULAR WEIGHT MEDIUM INVERTED OFF USERINFO NIL STYLE NIL) FORMATINFO NIL) (174 36 288 36) NIL) (HEADING NIL (HEADINGTYPE RUNNINGHEAD) (84 744 528 36) NIL) (TEXT NIL NIL (84 96 456 600) NIL))) (PAGE NIL (PAPERSIZE NIL . LETTER) (0 0 612 792) ((FOLIO NIL (PARALOOKS (QUAD CENTERED) CHARLOOKS (SUPERSCRIPT 0 INVISIBLE OFF SELECTPOINT OFF PROTECTED OFF SIZE 10 FAMILY MODERN OVERLINE OFF STRIKEOUT OFF UNDERLINE OFF EXPANSION REGULAR SLOPE REGULAR WEIGHT MEDIUM INVERTED OFF USERINFO NIL STYLE NIL) FORMATINFO NIL) (174 36 288 36) NIL) (HEADING NIL (HEADINGTYPE RUNNINGHEAD) (84 744 528 36) NIL) (TEXT NIL NIL (84 96 456 600) NIL))))) 5lÈ`l-ÈT-ÈT5HÈ<H,È,HHÈ,È,È ,È,ŠŠ8,ŠŠ8HÈÈ PAGEHEADING RUNNINGHEADCLASSICCLASSICCLASSICMODERN
MODERN
MODERN
MODERN MODERN 
  HRULE.GETFNMODERN
  HRULE.GETFNMODERN
  HRULE.GETFNMODERN


 HRULE.GETFNMODERN   HRULE.GETFNMODERN  (
Œƒ2Œ |Ådl3È?œ BMOBJ.GETFN3MODERN
N´Kx>
 5 ÅCÝ%4 BMOBJ.GETFN3MODERN
#u%ŠP L.%1 ývZ-eCñ³b+M¬Áé¡#4·M,Ÿh:ks¼zº