Developer, Former MVP, now at Microsoft - Best of 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
When an administrator logs on to a computer ... the system ... creates ... two different tokens representing the same logon session. The first token grants all the permissions and privileges afforded to the administrator while the second token is a restricted token ... offering far fewer permissions and privileges. ... The system then creates the shell application using the restricted token.
© Copyright 2004-2014, Daniel Moth -
Powered by newtelligence dasBlog 2.3.9074.18820
Page rendered Sunday, September 21, 2014 11:09:13 AM (Pacific Daylight Time, UTC-07:00)