Page 1 of 1

Can a machine be compromised by leveraging read only access?

Posted: Mon Jun 04, 2012 2:43 pm
by AgentSmith
I was wondering if anyone had done any research into this.. Is there any vital parts of the registry, or any other system files that should be protected from Read access?