I believe that all bits are still available but are mostly inaccessible or undocumented.
Try to set some rather funny custom permissions on a file and view them using the cacls utility.
Rather worse they implemented some very ill logic e.g. you can delete a file with "Everyone:R" permissions when you are the owner.
I suspect that some hidden logic is required with ACLs and therefore prefer the rather hard to understand Un*x permissions.
> never could get the hang of being able to execute programs
> even though i couldn't read the contents of the directory
> that they resided in, or even read them themselves.
Thomas
-------------------------------------------------
T h o m a s Z e h e t b a u e r ( TZ251 )
PGP encrypted mail preferred - KeyID 96FFCB89
mail pgp-key-request@hostmaster.org
-------------------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/