Tags » Access Control List

Using PowerShell to View File/Folder Permissions (Part 1)

Brief Intro

This post assumes that you already know how to launch PowerShell, what cmdlets are, the PowerShell pipline, and of course what is… 389 more words

Access Control List

Reporting on File, Folder and Share Permissions and how they Change


Late last year I was asked by a friend if I could write a program that could look at the ACL’s defined within a folder structure and report back how they differed from some previously recorded state. 1,176 more words

Access Control List

What is Access List?


Access Control List (ACL) can be used to implement a basic level of security in a network.

Types of Access List

There are two types of Access List. 9 more words


ORA-24247: network access denied by access control list - (ACL)

part of Oracle Security Implementation is that you can’t only grant an oracle user direct execution privilege on packages such as (UTL_TCP , UTL_SMTP, UTL_MAIL , UTL_HTTP… 162 more words

Access Control List

ACL Steganography

This post concentrates on fairly recent and unique steganography technique developed by Michael Perklin. When I stumbled across Perklins Defcon presentation about this development project I was amazed by its simplicity, ingenuity and unique flair, therefore I decided to create this post to shed more light on the underlying technology of this steganography technique. 728 more words

Access Control Entry


The NETWORK_ACL_ADMIN package provides the interface to administer the network access control lists (ACL). ACLs are used to control access by users to external network services and resources from the database through PL/SQL network utility packages including… 506 more words