Writing Secure Code for Windows Vista (Best Practices (Microsoft))

Federal Information Processing Standard (FIPS), 142–143

file downloads, blocking, 166.

See also parental controls

file overwrite privilege, 105

file registry, access to, 13

file system, access to, 13

file warnings, 42

files, integrity level of, setting, 38

FillString function, 4, 7

filtered tokens, 20

filtering, disabling, 166–167

_finally keyword, 67–68

FIPS (Federal Information Processing Standard), 142–143

firewalls

configurable properties, 86–87

creating rules, 87–92

global settings, 85–87

groups and interface properties, setting, 90–91

network access control, 107–110

rule groups, working with, 93–94

Teredo, 78–80

fixed pointers, 55

Flash, Adobe, 121, 122

FlushFileBuffers, 116

full (full-privilege) tokens, 20, 34

full-cone NAT, 79–80

function pointers, 54

randomization of, 58

functions.

See also specific functions

annotation of, 3

banned, 8

BCrypt*, 136

C/C++ annotation, example, 4–5

canonicalization, 130–131

cryptographic add-ins, 137–138

hash, 9, 136

heap defense, 57

Information Card, browser support detection, 158

Internet Explorer 7 Protected Mode, 124–125

NCrypt*, 136

SHA-1, 136

TBS, 180

URL parsing, deprecated, 131

WinMain, and heap defenses, 58–59

fuzzing, 50

FXCop analysis tool, 9

Категории