O'Reilly logo

Platinum Edition Using® Microsoft® Windows® XP by Brian Knittel, Robert Cowart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Components Involved in Access Control

Before we can really discuss the full access control process, we need to review the components that enable access control. The main items of concern are

  • Users and Security Identifiers

  • Objects and Containers (files and folders)

  • Access Control Lists and Access Control Entries

Users and Security Identifiers (SIDs)

User accounts and groups appear differently to humans and computers, and I'm not talking about binary versus ASCII. To you, your user name probably looks like some vague concatenation of your actual typed name, ID, or handle. You can clearly tell the difference between the Administrator account and the Guest account by glancing at the displayed names, “Administrator” or “Guest.” But Windows XP doesn't ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required