O'Reilly logo

Windows Vista Security: Praxisorientierte Sicherheit für Profis by Marcus Nasarek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

383
Chapter 11
CHAPTER 11
Securing and Sharing Your Data11
As discussed in earlier chapters, User Account Control (UAC) is part of Windows
Vista’s massive top-to-bottom security shield reconstruction, and it is meant to help
protect your computer from malicious software and network-based attacks. In
upcoming chapters, you’ll learn about built-in security programs, such as Windows
Defender and Windows Firewall, which are also designed to protect your computer
from malicious software and network-based attacks. While these security features
work wonderfully and do their job if configured properly, they don’t protect you
from insiders whose computers are connected to the same local network as your
computer, or from those who have a user account on your computer.
Without some additional protections for your files and data, your roommate, co-
worker, teenager, or anyone else with local access to your computer will be able to
read your email messages and go through your files and records. Just think what
might happen if one of these people finds that picture of you—you know the one,
the one you thought you deleted but didn’t—and then prints or sends it out to a few
dozen of your closest friends. This is where file access and sharing permissions come
into the picture.
File access permissions control who can access your files and other data. Sharing per-
missions control who can access files and other data that you want to share selec-
tively. If your computer doesn’t have properly configured file access and sharing
permissions, you don’t have any private files or data. You might as well print out the
photos, letters, or whatever other private files are on your computer and hand out
copies to everyone at the office or at home. Because you don’t want to do that and
because you do want to keep your private files private, you should take the time to
properly configure file access and sharing permissions. Best of all, thanks to a fea-
ture called inheritance, which ensures that any permissions you apply to the root
folder of a disk drive or any other folder are also applied to the new files created in
that folder, you will rarely have to change permissions once you configure them
appropriately.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required