Tags » Access Control List

Deny this not that

Being selective as to which packets get past and which don’t is a simple as the order of code in the ACE statements of an ACL. 84 more words

Using PowerShell to View File/Folder Permissions (Part 1)

Brief Intro

This post assumes that you already know how to launch PowerShell, what cmdlets are, the PowerShell pipline, and of course what is… 389 more words

PowerShell

Reporting on File, Folder and Share Permissions and how they Change

Introduction

Late last year I was asked by a friend if I could write a program that could look at the ACL’s defined within a folder structure and report back how they differed from some previously recorded state. 1,176 more words

Access Control List

What is Access List?

Introduction

Access Control List (ACL) can be used to implement a basic level of security in a network.

Types of Access List

There are two types of Access List. 9 more words

Networking

ORA-24247: network access denied by access control list - (ACL)

part of Oracle Security Implementation is that you can’t only grant an oracle user direct execution privilege on packages such as (UTL_TCP , UTL_SMTP, UTL_MAIL , UTL_HTTP… 162 more words

Access Control List

ACL Steganography

This post concentrates on fairly recent and unique steganography technique developed by Michael Perklin. When I stumbled across Perklins Defcon presentation about this development project I was amazed by its simplicity, ingenuity and unique flair, therefore I decided to create this post to shed more light on the underlying technology of this steganography technique. 728 more words

Access Control Entry