![]() ![]() This code basically inherits all the rights and permissions that the user has and can carry out all the activities a user can perform on the system. For example, if a user opens an attachment that is infected with a virus, the code can install itself in the background without the user being aware of this activity. While this model offers the best flexibility amongst any of the model, it is also its weakest point. While all seems good in the world of DAC, there are some issues with this model. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |