You're replying to a comment by David W.

David W Permalink
December 12, 2010, 14:01

Hi there,

This does very little for you, e.g. an attacker can still download a copy of command prompt, rename it "iexplore.exe", and find a way to run it.

Windows offers a more robust facility, which is whitelisting executables by MD5sum, but setting that up is a painstaking process.

Reply To This Comment

(why do I need your e-mail?)

(Your twitter name, if you have one. (I'm @pkrumins, btw.))

Type the first letter of your name: (just to make sure you're a human)

Please preview the comment before submitting to make sure it's OK.