This working area will check out latest strategies to utilize little-known or undocumented programs techniques in a house windows program

This working area will check out latest strategies to utilize little-known or undocumented programs techniques in a house windows program

Chuck Easttom

The focus would be on techniques that can be used to subvert the security on the system. For example api phone calls which can be used in manipulating the system and even in creating malware. There may even be coverage of essential SQL retained methods that can be used in the same manner, eg there is an undocumented stored procedure that may empty the System manager password. …