473,396 Members | 1,879 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

System.Security.AccessControl.FileSystemRights Enumeration confuses me

Hi all,

If you view the code for this BCL enum you will see that it is a flags
enum that somewhat jumps around.
For example, here is a subset of the flags:

ReadExtendedAttributes = 8,
WriteExtendedAttributes = 16,
ExecuteFile = 32,
Traverse = 32,
DeleteSubdirectoriesAndFiles = 64,
ReadAttributes = 128,
WriteAttributes = 256,
Write = 278,
Delete = 65536,
ReadPermissions = 131072,
Read = 131209,

While I do understand that "Write" and "Read" are just shortcut flags
that mean combinations of other flags, I don't see why it suddenly
jumps from 256 to 65536. There's a whole range of base 2 numbers being
skipped.

Can anyone shed some light on this? Its not causing any particular bug
but I do want to simplify menu access control to some files and don't
want to provide the whole enum (so the "read" and "write" shortcuts
are actually useful). Also, when I look at security permissions on a
file in XP, I get 6 main permission options:
Full Control, Modify, Read & Execute, Read, Write, and Special.
While I can guess which of these map back to the above enum, it would
be only guessing. Does anyone know of an official affiliation between
these so I can mapt he correct enum values?

Cheers,
Steven Nagy

Aug 16 '07 #1
0 1640

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Herman Geldenhuys | last post by:
I've written a Zope product that exposes a "MenuItem". I add a menuItem in a Zope folder, and I have no difficulty accessing and editing it via the ZMI. I've written an xml-rpc-like protocol for...
0
by: Herman Geldenhuys | last post by:
Oops! Sorry guys, wrong list... Apologies. ----- Original Message ----- From: Herman Geldenhuys To: python-list@python.org Sent: Wednesday, January 28, 2004 4:54 PM Subject: Security...
22
by: Alistair | last post by:
hello again oh knowledgable ones Today I took the plunge (more like a hell-hole dive) and upgraded to windows XP Pro.. and as I expected things are slightly different... what I didn't...
11
by: Vinod I | last post by:
Hi Team, I am having a string as "System.Data.SqlDbType.Int". Now I want to convert this string type to actual type to use with my Command object Parameter Creation. How I will convert this...
2
by: centrino | last post by:
hi, I want to extend System.Net.Sockets.ProtocolType to IPinIP protocol, how can i do that. Do i have to make new class or enum stuct for this type ? regards
0
by: Tom | last post by:
Is there any way to overload or add to a system enumeration? For instance, let's say I needed a couple more enumerations for the System.Data.OracleClient.OracleType.... Is there any way I can exend...
2
by: cdaddy | last post by:
Hello, I currently have both .NET framework 1.1 and .NET framework 2.0 installed on my dev machine. When I use the above line in my general declarations - Visual Basic tells me that the...
0
by: Martin jensson | last post by:
Hi, If I get the ACL of a desktop folder, I do not get the right security settings. (Directory is the folder on the desktop) DirectoryInfo^ dir = fileInfo->Directory; FileSecurity^...
0
by: Martin jensson | last post by:
Hi, If I get the ACL of a desktop folder, I do not get the right security settings. (Directory is the folder on the desktop) DirectoryInfo^ dir = DirInfo->Directory; DirectorySecurity^...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.