|
NT Trojan Profile Vulnerability
See discussion. Some people have reported trouble accessing the registry key across the networking using the reg.exe program that comes with the resource kit. You may need to write your own program that accesses the profile list key directly. |
|
Privacy Statement |