• November 12, 2004 12 Nov'04

    The Windows 2000 access control model

    This excerpt from "The definitive guide to Windows 2000 security" describes the difference between a privilege and permission, and how and why they're used.  Continue Reading

  • November 12, 2004 12 Nov'04

    The structure of a SID

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" describes the fields that make up a SID.  Continue Reading

  • November 12, 2004 12 Nov'04

    Well-known SIDs

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" offers examples of constant SIDs.  Continue Reading

  • November 12, 2004 12 Nov'04

    NTFS permissions

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.  Continue Reading

  • November 12, 2004 12 Nov'04

    RIDs and the RID Master role

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" explains how Windows tracks the uniqueness of relative identifiers (RIDs).  Continue Reading

  • November 12, 2004 12 Nov'04

    Access rights

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" describes access rights and permissions.  Continue Reading

  • November 12, 2004 12 Nov'04

    SIDs versus GUIDs

    This excerpt from "The definitive guide to Windows 2000 security" explains the difference between a globally unique identifier (GUID) and a security identifier (SID).  Continue Reading

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close