IBM system, and GINA, 159
icacls command/tool, 38, 41, 101
Ichiro persona, 17
ICredentialProvider interface, 159
IDA overflow advisory, 55
Identity Provider, 152, 153
Identity Selector, 156, 157
IEGetWritableFolderPath, 124
IEGetWriteableHKCU, 124
IEIsProtectedModeProcess, 124
IEIsProtectedModeURL, 125
IELaunchURL, 125
IEnumVARIANT, 109
iepmapi.lib, 124
IESaveFile, 124
IEShowSaveFileDialog, 124, 125
IEUser.exe, 125
IExplore.exe, 125
IFeedsManager, 82
IInternetSecurityManager, 131
IInternetSecurityManagerEx, 131
IInternetSecurityManagerEx2, 131
image files, 121
image randomization, 51
IMG tags, 132
ImpersonateNamedPipeClient, 17, 106, 112
implementations (callees), 3
_in macro, 5
inappropriate content, restricting. See parental controls
#include “sal.h,” 7
Independent Software Vendors (ISVs), 159, 167
INetFwPolicy2, 108
INetFwRules, 109
INetFwServiceRegistration, 108
INetwork::GetCategory, 82
INetwork::GetDomainType, 81
INetworkListManager, 81
INetworkListManagerEvents, 81
Information Cards, 151–153.
See also Windows CardSpace and Information Cards
browser support, detecting, 158
communicating parties, 152
creation of, 156
display Information Card use, 154
PIN protection, 154
programmatic access to, 156–157
user-issued, 152–153, 157
INI warnings, 43
IniFileMapping registry settings, 43
_in_opt macro, 5
_inout macro, 5
_inout_bcount_full(n) macro, 6
_inout_bcount_part(n,m) macro, 6
input buffers, TPM, 180
“Integer Handling with the C++ SafeInt Class” (LeBlanc), 55
integer manipulation, computer capability, 55
integer overflow warnings, 9–10
integrity levels, 13–14, 32–37
custom, 34
integrity SIDs, 34
low-integrity processes, write locations, 37
object integrity levels, determining, 39–40
object integrity levels, setting, 37–39
rules for, 40
setting, 45
integrity masks, 40
integrity models, 40
defensive, 41–42
Intel “Execute Disable” (XD-bit), 59
intellectual property rights, 151
Internet connections, determining, 81
Internet Explorer 7.
See also Internet Explorer 7 defenses
changes to, 132–133
integrity levels, 32
phishing detection, 154
Protected Mode, 40, 41–42, 124–126
third-party code, 58
Internet Explorer 7 defenses, 121–122
ActiveX control, locking, 131–132
ActiveX Opt-In, 122–123
AES, 132133
clipboard access disabled, 132
cURL and IUri interface, 130–131
Data Execution Prevention (DEP), 126–129
Protected Mode, 124–126
script URLs, 132
window origin, 133
Internet Protocol (IP), 76.
See also IPv4;
IPv6
Internetworking with TCP/IP Vol. I (Comer), 78
interprocess communication protocol (IPC), and integrity levels, 41
I/O completion ports, 98, 113
IP helper, 76
IPsec, 77
IPv4, 76–77
Teredo, 78–80
IPv6, 76–78
Teredo, 78–80
IPv6: The New Internet Protocol (Huitema), 77
IsElevated function, 27
IsRuleBookCurrentlyEnabled, 94
IsUserAnAdmin, 21
ISVs (Independent Software Vendors), 159, 167
IUri interface, 130–131
IWebBrowser2::get_LocationURL, 131–132
IXFeedsManager, 82