SlideShare une entreprise Scribd logo
1  sur  10
Network Implementation &
Support
Chapter 5
Managing File Access

Eric Vanderburg © 2006
File Systems
• FAT (Up to 4 GB)
• FAT32 (Up to 2 TB)
• NTFS (Up to 2 EB)
– Supports file level security
– Required for AD
– Quotas

Eric Vanderburg © 2006
Comparison
File
System

Logical
Drive Size

Sectors per Bytes per
Cluster
Cluster

FAT16

1-128 MB
128-256 MB
256-512 MB
512 MB–1 GB
1-4 GB

4
8
16
32
64

2,048
4,096
8,192
16,384
32,768

FAT32

512 MB-8 GB
8-16 GB
16-32 GB
> 32 GB

8
16
32
64

4,096
8,192
16,384
32,768

NTFS

1-512 MB
512 MB–1 GB
1-2 GB
> 2 GB

1
2
4
8

512
1,024
2,048
4,096

Eric Vanderburg © 2006
Shares
• Creating shared folders
• Viewing in Computer Management
• DACL (Discretionary Access Control List)
– List of users and permissions

• ACE (Access Control Entry)
– Individual users or group entries in the DACL

Eric Vanderburg © 2006
NTFS Permissions
• Full Control
• Modify (full minus delete subfolders,
change permissions, and ownership)
• Read & Execute (look at attributes &
permissions, traverse folders)
• List Folder Contents
• Read (no traverse)
• Write (create files and folders, change
attributes)
Eric Vanderburg © 2006
Special Permissions
•
•
•
•
•
•
•
•
•
•
•

Traverse Folder/Execute File
List Folder/Read Data
Read Attributes
Read Extended Attributes
Create Files/Write Data
Create Folders/Append Data
Write Attributes
Write Extended Attributes
Delete Subfolders & Files
Delete (specific to a file or folder)
Take Ownership
Eric Vanderburg © 2006
Folder NTFS Permissions
File NTFS Permissions
Eric Vanderburg © 2006
NTFS Permissions
• Add together
• Deny has precedence
• Child folders inherit permissions
• Inheritance can be blocked
• It can also be forced

Eric Vanderburg © 2006
Permissions
• Most restrictive between share and
security applies
• Usually share is full control and access is
determined solely by NTFS security

Eric Vanderburg © 2006
Acronyms
•
•
•
•

ACE, Access Control Entry
DACL, Discretionary Access Control List
FAT, File Allocation Table
NTFS, New Technology File System

Eric Vanderburg © 2006

Contenu connexe

En vedette

Internet raffaella valluzzi
Internet raffaella valluzziInternet raffaella valluzzi
Internet raffaella valluzzimarianavigato0
 
Textual analysis double page spread
Textual analysis  double page spreadTextual analysis  double page spread
Textual analysis double page spread051MARY
 
La vuelta al mundo
La vuelta al mundo La vuelta al mundo
La vuelta al mundo Mejit1234
 
20090605 Anysurfer Bart Simons
20090605 Anysurfer Bart Simons20090605 Anysurfer Bart Simons
20090605 Anysurfer Bart SimonsFARO
 
Pumb touch presentation
Pumb touch presentationPumb touch presentation
Pumb touch presentationbankiua
 
Somatprod
SomatprodSomatprod
SomatprodCarlos
 
Pensamientos para que lo disfruten el fin de semana
Pensamientos para que lo disfruten el fin de semanaPensamientos para que lo disfruten el fin de semana
Pensamientos para que lo disfruten el fin de semanaRoberto Guerrero V.
 
135. verdadera oración
135. verdadera oración135. verdadera oración
135. verdadera oraciónfomtv
 
Startup communities: Lessons and thoughts.
Startup communities: Lessons and thoughts.Startup communities: Lessons and thoughts.
Startup communities: Lessons and thoughts.Osvaldo Ayala
 
VSP 5.5 | VMware Sales Professional 5.5
VSP 5.5 | VMware Sales Professional 5.5VSP 5.5 | VMware Sales Professional 5.5
VSP 5.5 | VMware Sales Professional 5.5Marcio Amaral
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deploymentTyrone Systems
 
Final digital marketing strategy
Final digital marketing strategyFinal digital marketing strategy
Final digital marketing strategyKallieRiopelle
 

En vedette (20)

Profile
ProfileProfile
Profile
 
mumich
mumichmumich
mumich
 
Savi chapter2
Savi chapter2Savi chapter2
Savi chapter2
 
Pesaing pow
Pesaing powPesaing pow
Pesaing pow
 
Internet raffaella valluzzi
Internet raffaella valluzziInternet raffaella valluzzi
Internet raffaella valluzzi
 
Textual analysis double page spread
Textual analysis  double page spreadTextual analysis  double page spread
Textual analysis double page spread
 
La vuelta al mundo
La vuelta al mundo La vuelta al mundo
La vuelta al mundo
 
20090605 Anysurfer Bart Simons
20090605 Anysurfer Bart Simons20090605 Anysurfer Bart Simons
20090605 Anysurfer Bart Simons
 
Pumb touch presentation
Pumb touch presentationPumb touch presentation
Pumb touch presentation
 
Somatprod
SomatprodSomatprod
Somatprod
 
Bubbl us
Bubbl usBubbl us
Bubbl us
 
Pensamientos para que lo disfruten el fin de semana
Pensamientos para que lo disfruten el fin de semanaPensamientos para que lo disfruten el fin de semana
Pensamientos para que lo disfruten el fin de semana
 
135. verdadera oración
135. verdadera oración135. verdadera oración
135. verdadera oración
 
BASICfinal
BASICfinalBASICfinal
BASICfinal
 
Startup communities: Lessons and thoughts.
Startup communities: Lessons and thoughts.Startup communities: Lessons and thoughts.
Startup communities: Lessons and thoughts.
 
VSP 5.5 | VMware Sales Professional 5.5
VSP 5.5 | VMware Sales Professional 5.5VSP 5.5 | VMware Sales Professional 5.5
VSP 5.5 | VMware Sales Professional 5.5
 
India Powerpoint 2003
India Powerpoint 2003India Powerpoint 2003
India Powerpoint 2003
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deployment
 
Vision del producto app delivery
Vision del producto   app delivery Vision del producto   app delivery
Vision del producto app delivery
 
Final digital marketing strategy
Final digital marketing strategyFinal digital marketing strategy
Final digital marketing strategy
 

Similaire à Network Implementation and Support Lesson 05 File Access - Eric Vanderburg

Fat and ntfs
Fat and ntfsFat and ntfs
Fat and ntfsLucky Ali
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tablesshashikant pabari
 
OS_Assignment for Disk Space & File System & File allocation table(FAT)
OS_Assignment for Disk Space & File System & File allocation table(FAT)OS_Assignment for Disk Space & File System & File allocation table(FAT)
OS_Assignment for Disk Space & File System & File allocation table(FAT)Chinmaya M. N
 
File Access & File System & File Allocation Table
File Access & File System & File Allocation TableFile Access & File System & File Allocation Table
File Access & File System & File Allocation TableChinmaya M. N
 
Osdc2011.ext4btrfs.talk
Osdc2011.ext4btrfs.talkOsdc2011.ext4btrfs.talk
Osdc2011.ext4btrfs.talkUdo Seidel
 
Conceptual framework storage devices (2)
Conceptual framework   storage devices (2)Conceptual framework   storage devices (2)
Conceptual framework storage devices (2)Rajendra Sharma
 
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...Компания УЦСБ
 
Soluzioni integrate per il design e la comunicazione digitale: Buffalo
Soluzioni integrate per il design e la comunicazione digitale: BuffaloSoluzioni integrate per il design e la comunicazione digitale: Buffalo
Soluzioni integrate per il design e la comunicazione digitale: BuffaloPico Srl
 
Introduction to Disk Storage
Introduction to Disk StorageIntroduction to Disk Storage
Introduction to Disk StorageAmir Villas
 
Btrfs by Chris Mason
Btrfs by Chris MasonBtrfs by Chris Mason
Btrfs by Chris MasonTerry Wang
 
The future of tape april 16
The future of tape april 16The future of tape april 16
The future of tape april 16Josef Weingand
 

Similaire à Network Implementation and Support Lesson 05 File Access - Eric Vanderburg (20)

Os
OsOs
Os
 
Fat and ntfs
Fat and ntfsFat and ntfs
Fat and ntfs
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
File system
File systemFile system
File system
 
Mcts chapter 6
Mcts chapter 6Mcts chapter 6
Mcts chapter 6
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
 
OS_Assignment for Disk Space & File System & File allocation table(FAT)
OS_Assignment for Disk Space & File System & File allocation table(FAT)OS_Assignment for Disk Space & File System & File allocation table(FAT)
OS_Assignment for Disk Space & File System & File allocation table(FAT)
 
File Access & File System & File Allocation Table
File Access & File System & File Allocation TableFile Access & File System & File Allocation Table
File Access & File System & File Allocation Table
 
Ext filesystem4
Ext filesystem4Ext filesystem4
Ext filesystem4
 
Osdc2011.ext4btrfs.talk
Osdc2011.ext4btrfs.talkOsdc2011.ext4btrfs.talk
Osdc2011.ext4btrfs.talk
 
Windows file system
Windows file systemWindows file system
Windows file system
 
Operating system
Operating systemOperating system
Operating system
 
File System
File SystemFile System
File System
 
Conceptual framework storage devices (2)
Conceptual framework   storage devices (2)Conceptual framework   storage devices (2)
Conceptual framework storage devices (2)
 
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
 
Soluzioni integrate per il design e la comunicazione digitale: Buffalo
Soluzioni integrate per il design e la comunicazione digitale: BuffaloSoluzioni integrate per il design e la comunicazione digitale: Buffalo
Soluzioni integrate per il design e la comunicazione digitale: Buffalo
 
Introduction to Disk Storage
Introduction to Disk StorageIntroduction to Disk Storage
Introduction to Disk Storage
 
Btrfs by Chris Mason
Btrfs by Chris MasonBtrfs by Chris Mason
Btrfs by Chris Mason
 
The future of tape april 16
The future of tape april 16The future of tape april 16
The future of tape april 16
 
9781111306366 ppt ch4
9781111306366 ppt ch49781111306366 ppt ch4
9781111306366 ppt ch4
 

Plus de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Network Implementation and Support Lesson 05 File Access - Eric Vanderburg

  • 1. Network Implementation & Support Chapter 5 Managing File Access Eric Vanderburg © 2006
  • 2. File Systems • FAT (Up to 4 GB) • FAT32 (Up to 2 TB) • NTFS (Up to 2 EB) – Supports file level security – Required for AD – Quotas Eric Vanderburg © 2006
  • 3. Comparison File System Logical Drive Size Sectors per Bytes per Cluster Cluster FAT16 1-128 MB 128-256 MB 256-512 MB 512 MB–1 GB 1-4 GB 4 8 16 32 64 2,048 4,096 8,192 16,384 32,768 FAT32 512 MB-8 GB 8-16 GB 16-32 GB > 32 GB 8 16 32 64 4,096 8,192 16,384 32,768 NTFS 1-512 MB 512 MB–1 GB 1-2 GB > 2 GB 1 2 4 8 512 1,024 2,048 4,096 Eric Vanderburg © 2006
  • 4. Shares • Creating shared folders • Viewing in Computer Management • DACL (Discretionary Access Control List) – List of users and permissions • ACE (Access Control Entry) – Individual users or group entries in the DACL Eric Vanderburg © 2006
  • 5. NTFS Permissions • Full Control • Modify (full minus delete subfolders, change permissions, and ownership) • Read & Execute (look at attributes & permissions, traverse folders) • List Folder Contents • Read (no traverse) • Write (create files and folders, change attributes) Eric Vanderburg © 2006
  • 6. Special Permissions • • • • • • • • • • • Traverse Folder/Execute File List Folder/Read Data Read Attributes Read Extended Attributes Create Files/Write Data Create Folders/Append Data Write Attributes Write Extended Attributes Delete Subfolders & Files Delete (specific to a file or folder) Take Ownership Eric Vanderburg © 2006
  • 7. Folder NTFS Permissions File NTFS Permissions Eric Vanderburg © 2006
  • 8. NTFS Permissions • Add together • Deny has precedence • Child folders inherit permissions • Inheritance can be blocked • It can also be forced Eric Vanderburg © 2006
  • 9. Permissions • Most restrictive between share and security applies • Usually share is full control and access is determined solely by NTFS security Eric Vanderburg © 2006
  • 10. Acronyms • • • • ACE, Access Control Entry DACL, Discretionary Access Control List FAT, File Allocation Table NTFS, New Technology File System Eric Vanderburg © 2006