Tags » Access Control List

What is Access List?

Introduction

Access Control List (ACL) can be used to implement a basic level of security in a network.

Types of Access List

There are two types of Access List. 9 more words

Networking

Powershell [Set ACLs on Folders]

Information:

This post is about setting access control lists (ACLs) on folders and files. Setting ACLs programatically with use of any scripting language gives you the ability to do repeated tasks with ease. 239 more words

File I/O Functions

ORA-24247: network access denied by access control list - (ACL)

part of Oracle Security Implementation is that you can’t only grant an oracle user direct execution privilege on packages such as (UTL_TCP , UTL_SMTP, UTL_MAIL , UTL_HTTP… 162 more words

Access Control List

ACL Steganography

This post concentrates on fairly recent and unique steganography technique developed by Michael Perklin. When I stumbled across Perklins Defcon presentation about this development project I was amazed by its simplicity, ingenuity and unique flair, therefore I decided to create this post to shed more light on the underlying technology of this steganography technique. 728 more words

Access Control Entry