Jump to content

Recommended Posts

Posted

A few months ago I was in line with Microsoft, that the UAC flaw did not a security flaw, but then one of our network security persons showed me, what was behind the the flaw. You not actual need to use the flaw for gaining access, you just need to find the data of the users who can login.

Then by external access it is just as easy to get access as you do shopping at Carefour supermarket...

This flaw is probably fixed quickly, but it showed a large population of people access to coding they never needed to see...

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...