4/27/08

Coding Around UAC's Security Limitations

Mariam writes "Free os/2 developers from the non-profit NeoSmart Technologies have published a report recitation their experience with coding around ... from <strong class="keyword">malware</strong> authors. Quoting from the post: 'Perhaps most importantly though, is the fact that Windows<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://www.journalhome.com/insurance">The Insurrance Blog- JournalHome.com</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fwww.journalhome.com%2Finsurance" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 3 links from 3 sites</a>) <br /><br /><img width="1" height="1" src="http://static.technorati.com/y/1305904416.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wxfGh0dHA6Ly93d3cuam91cm5hbGhvbWUuY29tL1dlYkRldmVsb3Blci81ODE0Ni9jb2RpbmctYXJvdW5kLXVhY3Mtc2VjdXJpdHktbGltaXRhdGlvbnMuaHRtbCZ2aXNpdG9yaWQ9LSZ1c2VyaWQ9LSZzZXNzaW9uaWQ9NmRjYWY2NDI0ZGU5MGMyY2RjNTQ5YjIzZGY3NWY0MTImdXNlcmNsYXNzPTEmYWJjbGFzcz1iJmFic3dpdGNoPWEmbWVtYmVyPS0="/>