In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
In this issue, the editor will bring you about how to analyze the default permissions of NTFS. The article is rich in content and analyzes and narrates it from a professional point of view. I hope you can get something after reading this article.
Next I will explain the system permissions of Windows Vista Business Edition. Other different versions of Windows systems, such as Windows NT, Windows 2000, 2003, XP, and 2008, vary slightly from version to version. The default application scope is completely different. For example, in Windows 2000, the default NTFS permission of the Everyone group is Full Control for C:, and this permission is inherited by the entire level, which is extremely disadvantageous to system security. Other versions of Windows have made improvements in this area to avoid similar security vulnerabilities.
For most applications, the NTFS permission category is sufficient. These default permissions include:
1. Complete control
two。 Modify
3. Read and execute
4. List of folder contents
5. Read
6. Write
Generally speaking, if a user has Modify permission, he or she has permission to modify related files and folders. For example, if you have Read and Execute (read and execute) permissions, you have permission to read and list the contents of folders at the same time. Write (write) permissions are special because sometimes we want users to write to files or folders, but we don't want them to read the contents of them. Another very attractive permission is Full Control (full control). Full Control permissions not only allow users to edit files and folders, but also control and modify the access properties of files and folders.
These default permissions are actually combined by some independent permissions, as shown in Table A:.
Table A
Complete control
Modify
Read and execute
List folder (folder only)
Read
Write
Complete control
P
Traversing folders / execution files
P
P
P
P
List folder / read data
P
P
P
P
P
Read attribute
P
P
P
P
P
Read extended information
P
P
P
P
P
Create file / write data
P
P
P
Create folder / additional data
P
P
P
Write attribute
P
P
P
Write extended attributes
P
P
P
Delete subfolders and files
P
Delete
P
P
Read permission
P
P
P
P
P
P
Change permissions
P
Acquire ownership
P
We can notice that the composition of read and execute permissions, list folder permissions, and read permissions are very similar, but their scope of application is completely different.
Another thing to pay attention to for different permissions is their scope of application. The default permission properties are inherited from the top down.
We can modify the scope of application of a permission by changing the settings, including:
Current folder only
Current folders, subfolders, and files
Current folder, subfolder
Current folders and files
Only subfolders and files
Only subfolders
Files only
The scope of permissions in the default state is the current folder, subfolders, and files, that is, inheritance scope.
Of course, according to the requirements of the environment, we can set the scope of application of permissions. For example, control access to the C:Windows directory.
The above is the editor for you to share how to analyze the default permissions of NTFS, if you happen to have similar doubts, you might as well refer to the above analysis to understand. If you want to know more about it, you are welcome to follow the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.