HostedDB - Dedicated UNIX Servers

nt-part2_8 Analysis of the Security of  Windows NT 1 March 1999 8 List of Tables TABLE 1. Token for processes running in the SYSTEM security context .......13 TABLE 2. User Information ..............................................................................14 TABLE 3. Executive objects..............................................................................16 TABLE 4. Audit event types..............................................................................44 TABLE 5. Classification of weaknesses in NT..................................................62 TABLE 6. Classification of UNIX weaknesses .................................................70 TABLE 7. The flags field...................................................................................84 TABLE 8. The flags2 field.................................................................................85 TABLE 9. Commands in ERD Commander as described on the Web site. ......90