T


tags, IMG, 132

TakeOwnership, owner SIDs, 161

Task Manager, and virtualized files determination, 29

TBS (TPM Base Services), 177

Tbsip_Submit_Command, 180

TCG Software Stack (TSS), 177–178

Teredo, 76, 78–80

terminate on corruption code, and heap defenses, 58–59

third-party code, 58

thread tokens, 17

threat modeling, 1

time limits, setting, 165–166

time of day, system, modifying, 106

time zone, system, setting, 45

TLS, 132–133

token warnings, 43

TokenElevationTypeDefault, 21

TokenElevationTypeFull, 21

TokenElevationTypeLimited, 22

tokens. See user tokens

TokenUIAccess, 24

TPM (Trusted Platform Module), 163, 175–177

low-level access to, 177–181

TPM Base Services (TBS), 177

Trusted Computing Group, 175, 176

Trusted Platform Module (TPM). See TPM (Trusted Platform Module)

Trusted Sites zone, 133

_try keyword, 67

try-except block, and exception handling, 71

TSS (TCG Software Stack), 177–178



Writing Secure Code for Windows Vista
Writing Secure Code for Windows Vista (Best Practices (Microsoft))
ISBN: 0735623937
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net