Displaying 1 - 1 of 1 results

  • Circumventing Locks and Access Controls

    White Papers // Mar 2013 // provided by traces2

    Modern operating systems typically restrict access to critical or sensitive resources. For example, an internal database may not be intended for users to view or a resource may be currently in use. Such is the case when attempting to access the password databases maintained on systems running Microsoft Windows. When ...

    Download Now