Chapter 10. Using Standard NT Security Features in Windows 7

WHAT'S IN THIS CHAPTER?

  • Understanding the changes to basic Windows NT security

  • Considering how basic Windows NT security works

  • Interacting with Windows NT security features

Applications can rely on many layers of protection in Windows. The basic layer of protection has been around since Windows NT, which is why it's called Windows NT security. This is the level of security that provides file and other resource security through settings you provide. It's also the level that provides basic login security and that controls which resources the user can access based on the access requirements for that resource. Most developers understand that Windows NT security (or simply NT security) uses a resource lock and user access key pattern.

NT security hasn't remained static over the years. For example, Microsoft has added and redefined permissions as needed over the years to keep pace with user computing requirements. One of the more important recent changes occurred in Vista where Microsoft decided to lock down (deny access to) the root directory and other important operating system directories on the hard drive. In many respects, these new security features reflect the way that other operating systems such as Linux are configured, rather than showing something new from Microsoft. Even so, you need to learn how to work around the new security requirements when creating an application. It's no longer allowable to place files in the root ...

Get Professional Windows 7 Development Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.