We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

www.vustudents.ning.com

 www.bit.ly/vucodes + Link For Assignments, GDBs & Online Quizzes Solution www.bit.ly/papersvu + Link For Past Papers, Solved MCQs, Short Notes & More

Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

# GDB OF CS609 has announced Due date is 18/8/2015

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?

Views: 4473

.

+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

### Replies to This Discussion

mila kiya kisi ko ?

## Access Control Lists in the Security Descriptor

ACE Field

Description

ACL Size

Number of bytes, allocated for the ACL. This includes the ACL header, ACEs, and remaining free space in the buffer. The size of an ACL varies with the number and size of its ACEs. The maximum size of an ACL is 64K, or approximately 1,820 ACEs, depending on the size of the ACEs. However, for performance reasons, the maximum size is not practical.

ACL revision

Revision number for the ACL's data structure. The structure of an ACL is the same for all revisions, but the structure of ACEs in the ACL can vary

ACE count

Number of ACEs in the ACL. A value of zero means the ACL has no ACEs — it is empty; therefore, access-checking can stop. Note that an empty DACL differs from a NULL DACL. An empty DACL gives no access to anyone, but a NULL DACL gives unconditional access to everyone, and should therefore be avoided.

ACE[1]

An ordered list containing zero or more ACEs.During an access check, ACEs are  processed in the order in which they are listed.

ACE[...]

An ordered list containing zero or more ACEs.During an access check, ACEs are processed in the order in which they are listed.

FOR SECURITY

Attribute Type

Name

Description

\$STANDARD_INFORMATION
\$FILE_NAME \$Secure
\$DATA \$SDS

Security Descriptor Stream. Named data stream that contains a list of all the Security Descriptors on the volume.

\$INDEX_ROOT \$SDH Security Descriptor Hash index root
\$INDEX_ROOT \$SII

Security ID index root

\$INDEX_ALLOCATION \$SDH Security Descriptor Hash index storage allocation table
\$INDEX_ALLOCATION \$SII

Security ID Index storage allocation table

\$BITMAP \$SDH Security Descriptor Hash index bitmap
\$BITMAP \$SII

Security ID Index bitmap

This is NTFs security structure can we used it in FAT32 matadata.

maire khial s

System File File Name MFT    Record Purpose of the File
 Security file \$Secure 9 Contains unique security descriptors for all files within a         volume.

header k name tak ni mil rahay mujhe

mujy b kuch nhi mil raha GDB ka or time is very short

idea:

Security ka header "Secure" use kr sakty hain.

examples:

• ext
• ext2
• ext3
• ext4

these are extensions not headers :( :(

any one known plezzzzzzzzz share

i really dont know

## Latest Activity

11 minutes ago
1 hour ago
Rida Jaffery is now friends with Elegant and Hafiz Furqan Sabir
1 hour ago
zisani joined + M.Tariq Malik's group

### CS504 Software Engineering - I

4 hours ago
zisani joined + M.Tariq Malik's group

4 hours ago
4 hours ago
+ ! ! ! ❣ AaiMa ❣ !+ updated their profile
4 hours ago
Rida Jaffery joined + M.Tariq Malik's group

### ENG101 English Comprehension

4 hours ago
Rida Jaffery joined + M.Tariq Malik's group

### CS201 Introduction to Programming

4 hours ago
〘٢٧ دن〘جلیبیاں updated their profile
4 hours ago
Rehan posted a status
"MGMT 625..past papers???"
4 hours ago
+ ! ! ! ❣ maho ❣ ! + updated their profile
5 hours ago

1

2

3