Abuse Melding

Je hebt een klacht over de onderstaande posting:

15-11-2007, 08:56 door SirDice

http://weblog.infoworld.com/enterprisemac/archives/2006/08/is_windows_inhe.html • All Windows background processes/daemons are spawned from a single hyper-privileged process and referred to as services. *nix init doet precies hetzelfde. • By default, Windows launches all services with SYSTEM-level privileges. Alle *nix daemons worden in beginsel als root gestart. • SYSTEM is a pseudo-user (LocalSystem) that trumps Administrator (like UNIX's root) in privileges. SYSTEM cannot be used to log in, but it also has no password, no login script, no shell and no environment, therefore • The activity of SYSTEM is next to impossible to control or log. Is anders prima te auditten. En met ACLs kun je SYSTEM verhinderen. Probeer hetzelfde eens met root. • Most of the code running on any Windows system at a given time is related to services, most or all of which run with SYSTEM privileges, therefore Ten tijde van NT4 klopte dit. Tegenwoordig niet meer. • Successful infection of ...

Beschrijf je klacht (Optioneel):

captcha