This chapter establishes essential background information on the Windows OS and the applications developed for it. You've observed the important aspects of the object model, and how the Windows security model is applied. You've also discovered many of the more specific quirks of how Windows handles typical OS capabilities such as paths, process, and so on. With these tools, you should be able to note areas where the Windows architecture is confusing and where developers are more prone to make security mistakes. In the next chapter, you will expand on this foundation and address the unique issues that occur in communications across processes and remote systems. |