When he answers me, I'll see if he will give me permission to give out his name. But then again, there aren't THAT many App-V MVPs who are also CTPs! :)
Webster On Thu, Mar 17, 2011 at 12:45 PM, Rod Trent <[email protected]> wrote: > Who is he Carl? Maybe we can ask him, too? > > > > *From:* Carl Webster [mailto:[email protected]] > *Subject:* Re: App-V > > > > I don't really know the answer so I have asked an App-V MVP and fellow CTP > for an answer. This guy wrote the book on App-V, teaches App-V courses > around the world and was one of the first five people certified "back in the > day" by Softricity. He is also one of the few people I know who can discuss > Windows Internals with Mark R. I would take his answer as fairly > authoritative. > > > > > > Webster > > On Thu, Mar 17, 2011 at 11:16 AM, Rankin, James R <[email protected]> > wrote: > > Is an App-V streamed application, say, Excel 2000, still vulnerable to > exploitation in the same way as a traditionally-installed app? Or does the > streaming somehow insulate the process? My gut instinct says it can still be > exploited, maybe someone can provide a little irrefutable clarity. > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
