Can a machine be compromised by leveraging read only access?
Can a machine be compromised by leveraging read only access?
I was wondering if anyone had done any research into this.. Is there any vital parts of the registry, or any other system files that should be protected from Read access?
Who is online
Users browsing this forum: No registered users and 1 guest