hi, there
Most of vulnerabilities are also remotely exploitable although
enhanced security configuration and firewall enabled. For example, an
IE flaw will cause pc's registry modified when the host browse some
malicious website.
Client-Server model is a considerable solution. But our produ
But Windows XP with sp2 enhance the security configuration and block
these checking way. So we can not do local check on Windows XP sp2
except ask customers to do a lot of complex configuration.
Well, with the enhanced security configuration and firewall enabled, the
vulnerability is no longer
hi there:
I'm engaged in design a Remote Vulnerability Scanner. We have done
a non-preemptive multithread engine and written almost 2000
vulnerability plugins. Each one of plugins according to one CVE ID.
After we done these work, we get confused and don't know what to
do. first, although M