O'Reilly logo

Win32 Perl Programming: The Standard Extensions, Second Edition by Dave Roth

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Concepts

The way security is handled is not always obvious to a user. It is even less obvious to a programmer. Multiple concepts need to be understood before even the simplest of security can be applied. This section helps explain these concepts.

Security Subsystem

Security is managed by the operating system by means of associating a list of permission flags with different user accounts. All these flag and account mappings are stored into a block of memory that represents the security of an object.

From a high level, you can describe Win32 security with groups of objects. Basically, you take a user account and associate it with various permissions and flags. This grouping of information is called an access control entry (ACE). You ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required