I


IBM system, and GINA, 159

icacls command/tool, 38, 41, 101

Ichiro persona, 17

ICredentialProvider interface, 159

IDA overflow advisory, 55

Identity Provider, 152, 153

Identity Selector, 156, 157

IEGetWritableFolderPath, 124

IEGetWriteableHKCU, 124

IEIsProtectedModeProcess, 124

IEIsProtectedModeURL, 125

IELaunchURL, 125

IEnumVARIANT, 109

iepmapi.lib, 124

IESaveFile, 124

IEShowSaveFileDialog, 124, 125

IEUser.exe, 125

IExplore.exe, 125

IFeedsManager, 82

IInternetSecurityManager, 131

IInternetSecurityManagerEx, 131

IInternetSecurityManagerEx2, 131

image files, 121

image randomization, 51

IMG tags, 132

ImpersonateNamedPipeClient, 17, 106, 112

implementations (callees), 3

_in macro, 5

inappropriate content, restricting. See parental controls

#include “sal.h,” 7

Independent Software Vendors (ISVs), 159, 167

INetFwPolicy2, 108

INetFwRules, 109

INetFwServiceRegistration, 108

INetwork::GetCategory, 82

INetwork::GetDomainType, 81

INetworkListManager, 81

INetworkListManagerEvents, 81

Information Cards, 151–153.

See also Windows CardSpace and Information Cards

browser support, detecting, 158

communicating parties, 152

creation of, 156

display Information Card use, 154

PIN protection, 154

programmatic access to, 156–157

user-issued, 152–153, 157

INI warnings, 43

IniFileMapping registry settings, 43

_in_opt macro, 5

_inout macro, 5

_inout_bcount_full(n) macro, 6

_inout_bcount_part(n,m) macro, 6

input buffers, TPM, 180

“Integer Handling with the C++ SafeInt Class” (LeBlanc), 55

integer manipulation, computer capability, 55

integer overflow warnings, 9–10

integrity levels, 13–14, 32–37

custom, 34

integrity SIDs, 34

low-integrity processes, write locations, 37

object integrity levels, determining, 39–40

object integrity levels, setting, 37–39

rules for, 40

setting, 45

integrity masks, 40

integrity models, 40

defensive, 41–42

Intel “Execute Disable” (XD-bit), 59

intellectual property rights, 151

Internet connections, determining, 81

Internet Explorer 7.

See also Internet Explorer 7 defenses

changes to, 132–133

integrity levels, 32

phishing detection, 154

Protected Mode, 40, 41–42, 124–126

third-party code, 58

Internet Explorer 7 defenses, 121–122

ActiveX control, locking, 131–132

ActiveX Opt-In, 122–123

AES, 132133

clipboard access disabled, 132

cURL and IUri interface, 130–131

Data Execution Prevention (DEP), 126–129

Protected Mode, 124–126

script URLs, 132

window origin, 133

Internet Protocol (IP), 76.

See also IPv4;

IPv6

Internetworking with TCP/IP Vol. I (Comer), 78

interprocess communication protocol (IPC), and integrity levels, 41

I/O completion ports, 98, 113

IP helper, 76

IPsec, 77

IPv4, 76–77

Teredo, 78–80

IPv6, 76–78

Teredo, 78–80

IPv6: The New Internet Protocol (Huitema), 77

IsElevated function, 27

IsRuleBookCurrentlyEnabled, 94

IsUserAnAdmin, 21

ISVs (Independent Software Vendors), 159, 167

IUri interface, 130–131

IWebBrowser2::get_LocationURL, 131–132

IXFeedsManager, 82



Writing Secure Code for Windows Vista
Writing Secure Code for Windows Vista (Best Practices (Microsoft))
ISBN: 0735623937
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net