What are the constraints offered here by whitelisting to all of you? Where does the value-add lie and what are the limitations?
I'm seriously asking you to explain, you're saying I'm dancing around it and I'm genuinely trying to respond. I don't understand the attack you're saying invalidates whitelisting. Any attack involving "OS built-ins", requires unauthorized access first, right?
-
-
I get that you want auditing, but whitelisting can (and does) do that too without all the baggage.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Shouldn’t an attacker be able to do this with macros in whitelisted office? Which would allow to remove the whitelisting protection, assuming they knew that it was there.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.