adding bits about SAM database security, and what the SAM commands are