On Saturday, May 29, 2004 at 12:54:13 PM, Andrew Aronoff wrote: > Maybe not in his environment. IAC, I maintain it's highly unlikely > that a someone with User privileges would seek to exploit an opening > on this key.
If something CAN be abused, it WILL be abused sooner or later. > If the time stamp's not correct, it'll show up in the system tray. So the attacker has a visual feedback, while he is sitting in front of the computer. *g* Regards, Frank -- ________________________________________________________ http://www.silverstones.com/thebat/TBUDLInfo.html