Solved

permissions question

Posted on 2003-11-10
3
266 Views
Last Modified: 2010-04-14
what is the difference between :

Full controll       X
change             X
read                 X


if i remove the full controll , what are my restrictions ?


victor
0
Comment
Question by:victorbx
3 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 9716495
Full control is just that it allows whoever is assigned full control to do any thing they want with the folder/files

read means that the users that are assigned this and only this can only read the contents of the folder/file

>>>if i remove the full controll , what are my restrictions ?

It depenps on what other permissions you assign or don't assign to the user.
0
 
LVL 4

Expert Comment

by:darth_wannabe
ID: 9716535
removing Full control will mean that the user can not change the permissions.
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 9716718
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question