Page 1 of 1

User exploits

PostPosted: Fri Jan 21, 2005 4:14 pm
by xrath
Just read this paper and thought it was quite interesting:
http://www.dimva.org/dimva2004/material ... rPaper.pdf

Just wondered what everyone else thought in regards of using ACLs to protect from alias trojans etc.