Writing Secure Code for Windows Vista (Best Practices (Microsoft))
Chapter 2: User Account Control, Tokens, and Integrity Levels
- What Are Deny SIDs?
- The Mysterious Case of the Disappearing Elevation Prompt
- User Interface Privilege Isolation
Chapter 3: Buffer Overrun Defenses
- Bypassing NX
Chapter 4: Networking Defenses
- Setting the Group and Interface Properties
- BOOL, bool, and VARIANT_BOOL
Chapter 5: Creating Secure and Resilient
- Local and Global Namespaces
Chapter 6: Internet Explorer 7 Defenses
- Why Doesn’t Microsoft Just Get Rid of ActiveX Controls?
Chapter 9: Miscellaneous Defenses and Security-Related Technologies
- What Is a Trusted Platform Module?