Displaying 1 - 1 of 1 results

  • Circumventing Locks and Access Controls

    White Papers // Mar 2013 // provided by traces2

    Modern operating systems typically restrict access to critical or sensitive resources. For example, an internal database may not be intended for users to view or a resource may be currently in use. Such is the case when attempting to access the password databases maintained on systems running Microsoft Windows. When ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?