On Saturday, May 29, 2004 at 12:54:13 PM, Andrew Aronoff wrote:

> Maybe not in his environment. IAC, I maintain it's highly unlikely
> that a someone with User privileges would seek to exploit an opening
> on this key.

If something CAN be abused, it WILL be abused sooner or later.

> If the time stamp's not correct, it'll show up in the system tray.

So the attacker has a visual feedback, while he is sitting in front of the
computer. *g*

Regards,
Frank
-- 



________________________________________________________

http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to