bluej0k3r
bluej0k3r.bsky.social
bluej0k3r
@bluej0k3r.bsky.social
Infosec fan.
Reposted by bluej0k3r
Bypassing UAC
Bypassing UAC
As the gatekeeper between users and potentially dangerous system modifications, User Account Control (UAC) serves as a strong defender…
infosecwriteups.com
May 12, 2024 at 9:54 PM