Thank you to everyone who have supported us since our inception. We will be moving to our new site in the coming months. So please check it out at: www.idkrtm.com We will be migrating all the content over, so you don't have to worry about losing anything.
Access Control List - ACL's are used to specify who has access to what resources. Typically they are applied at either the network or file system level. Example: A network ACL may specify that users on the 10.1.1.0/24 subnet has access to NFS Shares on server1 whereas a file system ACL may specify that user1 can read and execute the files in folder1, but cannot delete the files.