Annotation of mstools/samples/sidcln/readme.txt, revision 1.1

1.1     ! root        1: Sample: Demonstration of the Win32 Security API Functions
        !             2: 
        !             3: Summary:
        !             4: 
        !             5: The SIDCLN sample demonstrates some of the Win32 security
        !             6: API functions, and provides a sample of how a utility could
        !             7: be written that recovers on-disk resources remaining
        !             8: allocated to deleted user accounts.
        !             9: 
        !            10: More Information:
        !            11: 
        !            12: The on-disk resources recovered are:
        !            13: 
        !            14:    Files that are still owned by accounts that have been
        !            15:    deleted are assigned ownership to the account logged on
        !            16:    when this sample is run.
        !            17: 
        !            18:    ACEs for deleted accounts are edited (deleted) out of
        !            19:    the ACLs of files to which the deleted accounts had been
        !            20:    granted authorizations (eg., Read access)
        !            21: 
        !            22: It may be that running this sample as a utility has no
        !            23: practical value in many environments, as the number of files
        !            24: belonging to deleted user accounts will often be quite
        !            25: small, and the number of bytes recovered on disk by editing
        !            26: out ACEs for deleted accounts may well not be worth the time
        !            27: it takes to run this sample.  The time it takes to run this
        !            28: sample may be quite significant when processing an entire
        !            29: hard disk or partition
        !            30: 
        !            31: Note:  This sample is not a supported utility.
        !            32: 
        !            33: TO RUN:
        !            34: 
        !            35:   You must log on using an account, such as Administrator,
        !            36:   that has the priviledges to take file ownership and edit
        !            37:   ACLs
        !            38: 
        !            39:   The ACL editing part of this sample can only be
        !            40:   excercised for files on a partition that has ACLs NT
        !            41:   processes:  NTFS
        !            42: 
        !            43: Typical test scenario:  Create a user account or two, log on
        !            44: as each of these accounts in turn, while logged on for each
        !            45: account, go to an NTFS partition, create a couple of files
        !            46: so the test accounts each own a few files, use the file
        !            47: manager to edit permissions for those files so that each
        !            48: test user has some authorities (e.g., Read) explicitly
        !            49: granted for those files.  Logon as Administrator, authorize
        !            50: each test user to a few Administrator-owned files.  Delete
        !            51: the test accounts.  Run the sample in the directories where
        !            52: you put the files the test accounts owned or were authorized
        !            53: to

unix.superglobalmegacorp.com