diff --git a/KernelLand/Kernel/include/vfs_ext.h b/KernelLand/Kernel/include/vfs_ext.h
index 42d986549cdc50e7dada4118350a700c5bbbe717..73d82ce58cd4d65643210d48029a123173677a74 100644
--- a/KernelLand/Kernel/include/vfs_ext.h
+++ b/KernelLand/Kernel/include/vfs_ext.h
@@ -70,6 +70,10 @@ enum eVFS_SeekDirs
  * \}
  */
 
+#define VFS_ACLENT_ALL	0x7FFFFFFF
+#define VFS_GROUP_ANY	{1, VFS_ACLENT_ALL}	//!< Rules for all users
+#define VFS_USER_NOBODY	{0, VFS_ACLENT_ALL}	//!< Rules for nobody
+
 /**
  * \brief MMap protection flags
  * \{
diff --git a/KernelLand/Kernel/vfs/acls.c b/KernelLand/Kernel/vfs/acls.c
index 7ae50c2fd34f4dd94a4523588931c3c3a6a8196d..f8d48608a16d707cbcd3b2c98fed2178365aab2f 100644
--- a/KernelLand/Kernel/vfs/acls.c
+++ b/KernelLand/Kernel/vfs/acls.c
@@ -9,21 +9,20 @@
 Uint	VFS_int_CheckACLs(tVFS_ACL *ACLs, int Num, int bDeny, Uint Perms, tUID UID, tGID GID);
 
 // === GLOBALS ===
-tVFS_ACL	gVFS_ACL_EveryoneRWX = { {1,-1}, {0,VFS_PERM_ALL} };
-tVFS_ACL	gVFS_ACL_EveryoneRW = { {1,-1}, {0,VFS_PERM_ALL^VFS_PERM_EXEC} };
-tVFS_ACL	gVFS_ACL_EveryoneRX = { {1,-1}, {0,VFS_PERM_READ|VFS_PERM_EXEC} };
-tVFS_ACL	gVFS_ACL_EveryoneRO = { {1,-1}, {0,VFS_PERM_READ} };
+tVFS_ACL	gVFS_ACL_EveryoneRWX = { VFS_GROUP_ANY, {0,VFS_PERM_ALL} };
+tVFS_ACL	gVFS_ACL_EveryoneRW  = { VFS_GROUP_ANY, {0,VFS_PERM_ALL^VFS_PERM_EXEC} };
+tVFS_ACL	gVFS_ACL_EveryoneRX  = { VFS_GROUP_ANY, {0,VFS_PERM_READ|VFS_PERM_EXEC} };
+tVFS_ACL	gVFS_ACL_EveryoneRO  = { VFS_GROUP_ANY, {0,VFS_PERM_READ} };
 
 // === CODE ===
 Uint VFS_int_CheckACLs(tVFS_ACL *ACLs, int Num, int bDeny, Uint Perms, tUID UID, tGID GID)
 {
-	 int	i;
-	for(i = 0; i < Num; i ++ )
+	for(int i = 0; i < Num; i ++ )
 	{
 		if(ACLs[i].Perm.Inv)
 			continue;	// Ignore ALLOWs
 		// Check if the entry applies to this case
-		if(ACLs[i].Ent.ID != 0x7FFFFFFF)
+		if(ACLs[i].Ent.ID != VFS_ACLENT_ALL)
 		{
 			if(!ACLs[i].Ent.Group) {
 				if(ACLs[i].Ent.ID != UID)	continue;
@@ -95,7 +94,7 @@ int VFS_GetACL(int FD, tVFS_ACL *Dest)
 	// Root can do anything
 	if(Dest->Ent.Group == 0 && Dest->Ent.ID == 0) {
 		Dest->Perm.Inv = 0;
-		Dest->Perm.Perms = -1;
+		Dest->Perm.Perms = VFS_PERM_ALL;
 		return 1;
 	}
 	
@@ -149,7 +148,7 @@ tVFS_ACL *VFS_UnixToAcessACL(Uint Mode, Uint Owner, Uint Group)
 	if(Mode & 0010)	ret[1].Perm.Perms |= VFS_PERM_EXEC;
 	
 	// Global
-	ret[2].Ent.Group = 1; ret[2].Ent.ID = -1;
+	ret[2].Ent.Group = 1; ret[2].Ent.ID = VFS_ACLENT_ALL;
 	ret[2].Perm.Inv = 0;  ret[2].Perm.Perms = 0;
 	if(Mode & 0004)	ret[2].Perm.Perms |= VFS_PERM_READ;
 	if(Mode & 0002)	ret[2].Perm.Perms |= VFS_PERM_WRITE;
diff --git a/Tools/NetTest_Runner/test_tcp.c b/Tools/NetTest_Runner/test_tcp.c
index 42aa2d5032c77c6bf480d14e55812452d74c6959..8515f7f5903f23dd47f184a687df3fc24fe49568 100644
--- a/Tools/NetTest_Runner/test_tcp.c
+++ b/Tools/NetTest_Runner/test_tcp.c
@@ -19,9 +19,9 @@
 static const int	ERX_TIMEOUT = 1000;	// Expect RX timeout (timeout=failure)
 static const int	NRX_TIMEOUT = 250;	// Not expect RX timeout (timeout=success)
 static const int	RETX_TIMEOUT = 1000;	// OS PARAM - Retransmit timeout
-static const int	LOST_TIMEOUT = 1000;	// OS PARAM - Time before sending an ACK 
-static const int	DACK_TIMEOUT = 500;	// OS PARAM - Timeout for delayed ACKs
-static const size_t	DACK_BYTES = 4096;	// OS PARAM - Threshold for delayed ACKs
+//static const int	LOST_TIMEOUT = 1000;	// OS PARAM - Time before sending an ACK 
+//static const int	DACK_TIMEOUT = 500;	// OS PARAM - Timeout for delayed ACKs
+//static const size_t	DACK_BYTES = 4096;	// OS PARAM - Threshold for delayed ACKs
 
 bool Test_TCP_Basic(void)
 {