Annotation of mstools/samples/sidcln/readme.txt, revision 1.1.1.1

1.1       root        1: Sample: Demonstration of the Win32 Security API Functions
                      2: 
                      3: Summary:
                      4: 
                      5: The SIDCLN sample demonstrates some of the Win32 security
                      6: API functions, and provides a sample of how a utility could
                      7: be written that recovers on-disk resources remaining
                      8: allocated to deleted user accounts.
                      9: 
                     10: More Information:
                     11: 
                     12: The on-disk resources recovered are:
                     13: 
                     14:    Files that are still owned by accounts that have been
                     15:    deleted are assigned ownership to the account logged on
                     16:    when this sample is run.
                     17: 
                     18:    ACEs for deleted accounts are edited (deleted) out of
                     19:    the ACLs of files to which the deleted accounts had been
                     20:    granted authorizations (eg., Read access)
                     21: 
                     22: It may be that running this sample as a utility has no
                     23: practical value in many environments, as the number of files
                     24: belonging to deleted user accounts will often be quite
                     25: small, and the number of bytes recovered on disk by editing
                     26: out ACEs for deleted accounts may well not be worth the time
                     27: it takes to run this sample.  The time it takes to run this
                     28: sample may be quite significant when processing an entire
                     29: hard disk or partition
                     30: 
                     31: Note:  This sample is not a supported utility.
                     32: 
                     33: TO RUN:
                     34: 
                     35:   You must log on using an account, such as Administrator,
                     36:   that has the priviledges to take file ownership and edit
                     37:   ACLs
                     38: 
                     39:   The ACL editing part of this sample can only be
                     40:   excercised for files on a partition that has ACLs NT
                     41:   processes:  NTFS
                     42: 
                     43: Typical test scenario:  Create a user account or two, log on
                     44: as each of these accounts in turn, while logged on for each
                     45: account, go to an NTFS partition, create a couple of files
                     46: so the test accounts each own a few files, use the file
                     47: manager to edit permissions for those files so that each
                     48: test user has some authorities (e.g., Read) explicitly
                     49: granted for those files.  Logon as Administrator, authorize
                     50: each test user to a few Administrator-owned files.  Delete
                     51: the test accounts.  Run the sample in the directories where
                     52: you put the files the test accounts owned or were authorized
                     53: to

unix.superglobalmegacorp.com