nt-part2_8
Analysis of the Security of Windows NT
1 March 1999
8
List of Tables
TABLE 1.
Token for processes running in the SYSTEM security context .......13
TABLE 2.
User Information ..............................................................................14
TABLE 3.
Executive objects..............................................................................16
TABLE 4.
Audit event types..............................................................................44
TABLE 5.
Classification of weaknesses in NT..................................................62
TABLE 6.
Classification of UNIX weaknesses .................................................70
TABLE 7.
The flags field...................................................................................84
TABLE 8.
The flags2 field.................................................................................85
TABLE 9.
Commands in ERD Commander as described on the Web site. ......90