• Aucun résultat trouvé

Assignment 7.1: Explain to your instructor:

N/A
N/A
Protected

Academic year: 2022

Partager "Assignment 7.1: Explain to your instructor:"

Copied!
1
0
0

Texte intégral

(1)

Windows Operating System Internals Assignments OS7

Assignment 7.1:

Explain to your instructor:

 How is the concept of discretionary access control implemented in Windows?

 What is a security descriptor?

 What is the typical structuring of a discretionary access control llist (DACL)?

 What is the purpose of the system access control list (SACL)?

Assignment 7.2:

Let us assume a program successfully opens a file via CreateFile() with the

“GENERIC_WRITE” flag. In the next step, a user modifies access rights on the file – in particular, he adds a “deny ACE” effectively denying “write access” for all users.

Finally, the above-mentioned program tries to write to the file using “WriteFile()”.

Will the call to “WriteFile()” succeed? Explain your answer.

Assignment 7.3:

Let us assume that Alice is a member of the student’s group and a file she wants to access has a DACL with three ACEs composed as follows:

1st ACE: Bob can't read from the file 2nd ACE: Students can't read from the file 3rd ACE: Alice can write and delete the file

Will Alice be able to read from the file? How would the result change if the 2nd ACE were removed? Explain your answer.

Assignment 7.4:

Let us assume there is a program “shutdown.exe” that allows for shutting down the local computer. How would you restrict the right to execute “shutdown.exe” to a particular user – the “operator”?

How could the general concept of objects and access control lists be used to implement privileges – in particular the “shutdown privilege”?

Explain your answer.

June 2005 © 2005 David A. Solomon and Mark Russinovich with Andreas Polze 1

Références

Documents relatifs

Collectively, fam- ily physicians in a community can use these lists to define the number of people in need of care and then deter- mine to what extent current physicians

Give a short explanation of the following terms and its usage in context of Windows networking to your instructor:?. 

The first one should be a socket client application that takes a server address (IP address + port) and an input file and sends its content to a (possibly) remote server.. The

instructor how this function can be used to access performance counter information obtained through performance data providers and made visible in the registry. December 2005 by

Write a named-pipe client that connects to the server and executes a main loop that reads user input, sends it to the server, gets the server response and prints it on

 Draw a Gantt chart illustrating the execution of these threads under the assumption that they all are executed at a static priority of 8.  How does the execution order change if

Which approach is taken by the Windows I/O subsystem in order to support both, synchronous and asynchronous I/O operations.

Explain to your instructor how a multilevel directory structure could be simulated with a single-level directory structure in which arbitrarily long names can be used?. How would