Before we can really discuss the full access control process, we need to review the components that enable access control. The main items of concern are
Users and Security Identifiers
Objects and Containers (files and folders)
Access Control Lists and Access Control Entries
User accounts and groups appear differently to humans and computers, and I'm not talking about binary versus ASCII. To you, your user name probably looks like some vague concatenation of your actual typed name, ID, or handle. You can clearly tell the difference between the Administrator account and the Guest account by glancing at the displayed names, “Administrator” or “Guest.” But Windows XP doesn't ...