User-Level versus Share-Level Security

When deciding which type of security validation to use, keep in mind the nature of the resources being protected. Traditional network security policies dictate that sensitive data should always be stored on server drives for protection against both intrusion and accidental loss.

Adding peer networking as an adjunct to a client/server arrangement is supposed to be a tool of convenience, and user-based security can sometimes defeat that purpose. If you regularly have a network administrator create user accounts on the Windows NT server in order to grant access to workstation devices, you then defeat the purpose of implementing a peer system, in part. You must, therefore, also consider your network's existing ...

Get Special Edition Using Windows 95 with Internet Explorer 4.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.