O'Reilly logo

Win32 Perl Programming: The Standard Extensions, Second Edition by Dave Roth

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Security

Back in the old DOS and Windows 3.1 days, the way security was approached was actually pretty funny. The extent of it was that you could set a flag on a file indicating that it was read-only or that it was hidden, although there was nothing to prevent a user from using the attrib.exe command to change those settings. Because most users did not understand such flags, it was a reasonable way to secure data. This is still true with Win 95/98/ME machines.

However, when Windows NT came along, the concept of security took a bold step forward. NT defined a security system that was fairly foolproof. One would have to purposely hack into it to circumvent the intended security. With NT/Win2k/XP, security could be placed on anything: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required