Download now Free registration required
One of the more powerful and popular features that modern day operating systems offers its end users and administrators is the ability to register applications that can be automatically initiated. These applications will typically execute in the background with minimal or no interaction with the end user. This functionality enhances the end user's experience and furthermore enables system administrators to exert complete control over the machines in their environment. What application developers need to be aware of is that attackers can target these same systems by exploiting 'Insecurely Registered Applications' on target systems.
- Format: PDF
- Size: 416.9 KB