| Rating: 1 | | Total Hits - 67 | | | The most simple way for the potential intruders is to write ``something into startup section of the registry. A number of ``trojans work this way. This can be done via network, without ``being physically present at the attacked computer! Having tested ``our Windows network we discovered that a half of all workstations ``had their registry open for everyone! The system registry has ``some vital keys which, if tampered with, make a security breach, ``destroy data. You can easily monitor the registry on the local or ``remote computer with our AxTNTRegSecurity control. It is another ``descendant of the common ancestor of all components which deal ``with different aspects of Windows NT security. | | http://www.belcaf.com/ | Last Updated on 7/2/2008 6:15:00 PM |
|
| Ratings | | |
| No Ratings | | | |
|
|