Access Control List in .NET Framework

Written by Balaji

Continued from page 1

To restrict access torepparttar users for certain resources of an application, a process of identifyingrepparttar 133475 users becomes a necessity. Authentication enables to restrict a user to accessrepparttar 133476 resources by certain ways. It could be a combination of a username and password, a digital certificate, a smart card or a fingerprint reader. The validity ofrepparttar 133477 information provided byrepparttar 133478 user helps identifyrepparttar 133479 user, so thatrepparttar 133480 user is provided access torepparttar 133481 requested resources. The process of successful identification ofrepparttar 133482 user implies thatrepparttar 133483 user is authenticated.

After identification ofrepparttar 133484 user is over,repparttar 133485 next step is to determine whetherrepparttar 133486 authenticated user has access torepparttar 133487 resources. The process of determiningrepparttar 133488 access torepparttar 133489 resources for a particular user is known as Authorization. In Windows based systems, resources have an Access Control List, which provides a list of users who have access to that resource. The list also specifiesrepparttar 133490 kind of access such as read, write, modify, and deleterepparttar 133491 resource, for each user. For example, if a user requests an ASP page,repparttar 133492 operating system checks whetherrepparttar 133493 user has Read access torepparttar 133494 page and ifrepparttar 133495 user has read permission, thenrepparttar 133496 operating system allowsrepparttar 133497 IIS to fetchrepparttar 133498 page. The IIS has authorization settings which enablerepparttar 133499 IIS to controlrepparttar 133500 access of resources by users. File Access Control Lists are set for a given file or directory usingrepparttar 133501 Security tab inrepparttar 133502 Explorer property page.

To access online version ofrepparttar 133503 above article, go to

Visit for a complete introduction to .NET framework. Learn about ASP.NET, VB.NET, C# and other related technologies.

Selecting a Cell Phone

Written by Deryck Richards

Continued from page 1

If you want to purchase a camera phone, consider what quality of photos you need to take. Most camera phones have less than a one megapixel resolution, which produces low-quality images. If you need to take clear photos, look into a camera phone with 3 or more megapixels.

Voice Dialing and Bluetooth are becoming standard in many phones to make it easier and safer for people to use their phones while driving. Voice Dialing allows you to speak a personís name into your phone, which will automatically findrepparttar person in your address book and dialrepparttar 133474 number for you. Bluetooth lets you connect a headset to your phone without wires. Some luxury cars are beginning to offer Bluetooth connectivity so that you can take calls in your car throughrepparttar 133475 built-in speaker system.

Some newer cell phones are being designed with an emphasis on entertainment. They can be used to play music MP3 files, stored video and even movies, and video games. In general,repparttar 133476 newer phones are all getting smarter and more specialized.

After youíre done choosingrepparttar 133477 features that you want, donít neglectrepparttar 133478 practical aspects. Look at how often you will need to changerepparttar 133479 battery, whetherrepparttar 133480 screen and keypad are too big and too small. Also, caveat emptor: most cellular providers lock you into a one or two year contract when you purchase a phone from them. If you cancel your service, they will charge you an early termination fee.

Deryck Richards is the founder and managing partner of Desktronix. With an extensive background in computer information systems, Deryck manages hosting and data center operations for Desktronix. He also provides system administration and technical support to small businesses as he has since 2000. For more information on Deryck Richards and Desktronix, visit

    <Back to Page 1 © 2005
Terms of Use