Can a machine be compromised by leveraging read only access?
Posted: Mon Jun 04, 2012 2:43 pm
I was wondering if anyone had done any research into this.. Is there any vital parts of the registry, or any other system files that should be protected from Read access?