When he answers me, I'll see if he will give me permission to give out his
name.  But then again, there aren't THAT many App-V MVPs who are also CTPs!
:)


Webster

On Thu, Mar 17, 2011 at 12:45 PM, Rod Trent <[email protected]> wrote:

>  Who is he Carl?  Maybe we can ask him, too?
>
>
>
> *From:* Carl Webster [mailto:[email protected]]
> *Subject:* Re: App-V
>
>
>
> I don't really know the answer so I have asked an App-V MVP and fellow CTP
> for an answer.  This guy wrote the book on App-V, teaches App-V courses
> around the world and was one of the first five people certified "back in the
> day" by Softricity.  He is also one of the few people I know who can discuss
> Windows Internals with Mark R.  I would take his answer as fairly
> authoritative.
>
>
>
>
>
> Webster
>
> On Thu, Mar 17, 2011 at 11:16 AM, Rankin, James R <[email protected]>
> wrote:
>
> Is an App-V streamed application, say, Excel 2000, still vulnerable to
> exploitation in the same way as a traditionally-installed app? Or does the
> streaming somehow insulate the process? My gut instinct says it can still be
> exploited, maybe someone can provide a little irrefutable clarity.
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to