|
Table of ContentsTopics for the day… General Security Internal vs. External Security Internal security issues Steps taken to try to login Steps taken after login Access Token information Object Permissions Assigning Permissions Users vs. Groups File Access Permissions File Access Types Folder Access Types Setting a file’s permissions Notes about file permissions Steps taken to open an object Resolving access conflicts Fun HTTP sites |
Author: Dan Chaney
Email: ma194@ms.uky.edu Home Page: http://www.ms.uky.edu/~ma194 Other information: |