In this paper, I'm going to demonstrate the fact that a shadow software
attack is still possible. In fact, many users and system admins are not
aware of the importance of the protection mechanisms against these kind
attacks. There are many possible solutions to resolve this scenario,
often requires some engagement from the server and the userís side and
probably this is the very essence of the entity of the problem that we
going to face...
This document is in pdf format. To
view it click here.