M
mjacobs
Guest
Windows has a number of ways for a process to impersonate another user account and execute [a sub-process] as that user. The caveat is that all of ways I know of require the caller to know the user account's password. To my knowledge the Windows security system does not have the UNIX equivalent of 'su' where you can impersonate any user account without knowing the account's password if you are a privileged user. Perhaps someone else knows a way to trick the Windows security system into impersonating without knowing the user account password.
Continue reading...
Continue reading...