resources and events that can help you keep your security knowledge
and skills up to date and keep your Windows and other systems secure.
=== SECURITY Q&A ===============================================
by Randy Franklin Smith, rsmith@ultimatewindowssecurity.com
Q: What permissions does Windows require in order to rename a file?
A: Windows treats a file renaming operation as a deletion of the file
and creation of a new file with the new name. Therefore, you must have
either the Delete permission on the file itself or the Delete
Subfolders and Files permission on the folder that contains the file.
You must also have Write Data permission on the folder because of the
new-file creation.
In addition to these permissions, the ren command requires Read
Attributes permission and Synchronize permission to both the folder and
the actual file and the List Directory permission to the folder. These
permissions allow the ren command to check for the existence of the
file and verify that the file's attributes (e.g., the Read Only
attribute) don't prevent the rename.
(This Security Q&A originally appeared in Security Pro VIP's
Access Denied column.)
=== SECURITY RESOURCES =========================================
The following security-related resources are brought to you by Windows
IT Pro. For additional resources and information, visit
http://list.windowsitpro.com/t?ctl=45A4E:886699
Achieve compliance in today's complex regulatory environment, while
managing threats to the inward- and outward-bound communications vital
to your business. Adopt a best-practices approach, such as the one
outlined in the international information security standard ISO/IEC
17799:2005. Download the white paper today to secure the
confidentiality, availability and integrity of your corporate
information!
http://list.windowsitpro.com/t?ctl=45A46:886699
Are you protected company-wide against spyware, keyloggers, adware, and
backdoor Trojans? Test the state of the art scanning engine that uses
threat signatures from multiple sources to track down the culprits that
antivirus solutions alone can't protect you against. Download your free
30 day trial of CounterSpy Enterprise today!
http://list.windowsitpro.com/t?ctl=45A48:886699
Learn the commonalities across multiple compliance regulations and
standards to optimize your environment and save time and money.
http://list.windowsitpro.com/t?ctl=45A47:886699
================================================================
Security UDPATE is brought to you by the Windows IT Pro Web site's
Security page (first URL below) and Security Pro VIP (second URL
below).
http://list.windowsitpro.com/t?ctl=45A4B:886699
http://list.windowsitpro.com/t?ctl=45A4D:886699
Subscribe to Security UPDATE at
http://list.windowsitpro.com/t?ctl=45A4A:886699
Unsubscribe by clicking
http://list.windowsitpro.com/u?id=4160B336D0B60CB1D3AFBB2244D5A147
Be sure to add Security_UPDATE@list.windowsitpro.com
to your antispam software's list of allowed senders.
To contact us:
About Security UPDATE content -- letters@windowsitpro.com
About technical questions -- http://list.windowsitpro.com/t?ctl=45A4C:886699
About your product news -- products@windowsitpro.com
About your subscription -- windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- salesopps@windowsitpro.com
View the Windows IT Pro privacy policy at
http://list.windowsitpro.com/t?ctl=45A49:886699
Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department
Copyright 2007, Penton Media, Inc. All rights reserved.
No comments:
Post a Comment