Developer, Former MVP, now at Microsoft - Best of 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
When an administrator logs on to a computer ... the system ... creates ... two different tokens representing the same logon session. The first token grants all the permissions and privileges afforded to the administrator while the second token is a restricted token ... offering far fewer permissions and privileges. ... The system then creates the shell application using the restricted token.
© Copyright 2004-2014, Daniel Moth -
Powered by newtelligence dasBlog 2.3.9074.18820
Page rendered Saturday, August 23, 2014 10:20:08 AM (Pacific Daylight Time, UTC-07:00)