News

Monday, January 08, 2007

Resource Edition

This extra, monthly edition of Security UPDATE lets you know about
resources and events that can help you keep your security knowledge
and skills up to date and keep your Windows and other systems secure.


=== SECURITY Q&A ===============================================
by Randy Franklin Smith, rsmith@ultimatewindowssecurity.com

Q: What permissions does Windows require in order to rename a file?

A: Windows treats a file renaming operation as a deletion of the file
and creation of a new file with the new name. Therefore, you must have
either the Delete permission on the file itself or the Delete
Subfolders and Files permission on the folder that contains the file.
You must also have Write Data permission on the folder because of the
new-file creation.

In addition to these permissions, the ren command requires Read
Attributes permission and Synchronize permission to both the folder and
the actual file and the List Directory permission to the folder. These
permissions allow the ren command to check for the existence of the
file and verify that the file's attributes (e.g., the Read Only
attribute) don't prevent the rename.

(This Security Q&A originally appeared in Security Pro VIP's
Access Denied column.)


=== SECURITY RESOURCES =========================================
The following security-related resources are brought to you by Windows
IT Pro. For additional resources and information, visit

http://list.windowsitpro.com/t?ctl=45A4E:886699

Achieve compliance in today's complex regulatory environment, while
managing threats to the inward- and outward-bound communications vital
to your business. Adopt a best-practices approach, such as the one
outlined in the international information security standard ISO/IEC
17799:2005. Download the white paper today to secure the
confidentiality, availability and integrity of your corporate
information!

http://list.windowsitpro.com/t?ctl=45A46:886699

Are you protected company-wide against spyware, keyloggers, adware, and
backdoor Trojans? Test the state of the art scanning engine that uses
threat signatures from multiple sources to track down the culprits that
antivirus solutions alone can't protect you against. Download your free
30 day trial of CounterSpy Enterprise today!

http://list.windowsitpro.com/t?ctl=45A48:886699

Learn the commonalities across multiple compliance regulations and
standards to optimize your environment and save time and money.

http://list.windowsitpro.com/t?ctl=45A47:886699


================================================================

Security UDPATE is brought to you by the Windows IT Pro Web site's
Security page (first URL below) and Security Pro VIP (second URL
below).

http://list.windowsitpro.com/t?ctl=45A4B:886699

http://list.windowsitpro.com/t?ctl=45A4D:886699

Subscribe to Security UPDATE at

http://list.windowsitpro.com/t?ctl=45A4A:886699

Unsubscribe by clicking

http://list.windowsitpro.com/u?id=4160B336D0B60CB1D3AFBB2244D5A147

Be sure to add Security_UPDATE@list.windowsitpro.com
to your antispam software's list of allowed senders.

To contact us:
About Security UPDATE content -- letters@windowsitpro.com
About technical questions -- http://list.windowsitpro.com/t?ctl=45A4C:886699

About your product news -- products@windowsitpro.com
About your subscription -- windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at

http://list.windowsitpro.com/t?ctl=45A49:886699

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2007, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive