FW: Description of the new 'ntsec' feature

Mumit Khan khan@xraylith.wisc.EDU
Tue Aug 31 23:49:00 GMT 1999


Corinna Vinschen <corinna@vinschen.de> writes:
> > Did you check how POSIX security is emulated in the Interix subsystem
> > against NT's security?

Interix is "special" since it uses its own subsystem, and has the added
advantage of running on NT only. I don't believe looking at Interix is
that productive. A more comparable implementation in this regard is AT&T 
UWIN, and it does go to some length to handle permission and so on (via 
two services on NT, and somewhat braindead on Win9x).

> No. It's a "clean room implementation". I don't want to look how it's
> solved in other systems but I want to hear discussions and opinions
> how to do our own implementation.

That's the best way, especially when it comes implementing proprietary
interfaces as well as emulating proprietary implementations.

Regards,
Mumit


--
Want to unsubscribe from this list?
Send a message to cygwin-unsubscribe@sourceware.cygnus.com



More information about the Cygwin mailing list