{"height":"190","blog_url":"https://rlyeh.hatenadiary.org/","version":"1.0","description":"\u305f\u304b\u306f\u3057\u3082\u3068\u306e\u3076\u3055\u3093\u306eCACLS.EXE \u30b3\u30de\u30f3\u30c9\u306e\u51fa\u529b\u306e\u610f\u5473 \u3084 NTFS\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u3092\u4e00\u62ec\u3057\u3066\u8a2d\u5b9a\u3059\u308b \u3082\u4f75\u305b\u3066\u898b\u3066\u304a\u304d\u307e\u3057\u3087\u3046\u3002 cacls.exe \u3088\u308a\u3082\u9ad8\u6a5f\u80fd\u306a xcacls.vbs \u306e\u60c5\u5831\u3068\u3057\u3066\u306f\u3001Xcacls.vbs \u3092\u4f7f\u7528\u3057\u3066 NTFS \u30a2\u30af\u30bb\u30b9\u8a31\u53ef\u3092\u5909\u66f4\u3059\u308b\u65b9\u6cd5 \u3092\u53c2\u7167\u3002\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u306f\u3053\u3061\u3089 \u21d2 Extended Change Access Control List Tool (Xcacls) #\u4ee5\u4e0b\u306f\u81ea\u5206\u7528\u306e\u30e1\u30e2 \u30d5\u30a1\u30a4\u30eb\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u3067\u306f\u306a\u304f\u3001\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u3092\u5909\u66f4\u3059\u308b\u305f\u3081\u306b\u306f\u3001GUI \u3067\u306a\u3089 regedt32.exe (XP/2003 \u306a\u3089 regexit.exe)\u2026","provider_url":"https://hatena.blog","url":"https://rlyeh.hatenadiary.org/entry/20060127/1138372028","published":"2006-01-27 23:27:08","blog_title":"R&#x0027;lyeh \u30ce\u8a18","width":"100%","author_url":"https://blog.hatena.ne.jp/rlyeh/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Frlyeh.hatenadiary.org%2Fentry%2F20060127%2F1138372028\" title=\"cacls\u30b3\u30de\u30f3\u30c9\u306e\u51fa\u529b\u306e\u898b\u65b9 (@IT) - R&amp;#x0027;lyeh \u30ce\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","type":"rich","image_url":null,"provider_name":"Hatena Blog","title":"cacls\u30b3\u30de\u30f3\u30c9\u306e\u51fa\u529b\u306e\u898b\u65b9 (@IT)","author_name":"rlyeh","categories":["Security"]}