H


hardcoded algorithms, 137, 148

hash-based message authentication codes (HMACs), 136

hash functions, 9, 136

hashing data, 141

headers, 8

heap

countermeasures, 58

defenses, 55–59, 72

overrun, 57, 173

randomization, 51

heap spraying, 55

HeapTerminateOnCorrupt, 72

high-integrity objects

determining, 39–40

labeling, 37–39

high-integrity processes, 32–34, 37, 41–42

high-level privileges, 104–106

highestAvailable manifest option, 23

HKCU registry, 43

HKLM registry, 13, 43

HMAC (hash-based message authentication codes), 136

“How Windows Defender Identifies Spyware,” 168

Howard, Michael, 1, 49, 83, 130, 181

HTML, 121, 123

clipboard access, Internet Explorer 7, 132

gadgets, 181

Identity Selector, Information Card, 157

HTTP remote file access, 145

HTTPExemptionList, 167

Huitema, Christian, 77, 80

Humphrey, Watts, 50, 97

Hungarian notation, 8



Writing Secure Code for Windows Vista
Writing Secure Code for Windows Vista (Best Practices (Microsoft))
ISBN: 0735623937
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net