Can a machine be compromised by leveraging read only access?

If it doesn't fit elsewhere, it goes here
Post Reply
AgentSmith

Can a machine be compromised by leveraging read only access?

Post by AgentSmith » Mon Jun 04, 2012 2:43 pm

I was wondering if anyone had done any research into this.. Is there any vital parts of the registry, or any other system files that should be protected from Read access?

Post Reply

Who is online

Users browsing this forum: No registered users and 2 guests