Last Updated: 2006-09-25 23:11:25 UTC
by Adrien de Beaupre (Version: 1)
This would be highly recommended measure in a Microsoft centric environment, as one of the defence-in-depth layers of protection, not by itself. Please see the earlier diary entries on the VML vulnerability and its current exploitation here.
Adrien de Beaupré