Compartir a través de


GWES Security (Windows CE 5.0)

Send Feedback

It is important always to use secure coding techniques while you work with the GWES functionality in Windows CE.

For more information about Windows CE security services, see Enhancing the Security of a Device.

Best Practices

Do not save sensitive information on the clipboard

By design, the clipboard serves as a mechanism for interprocess communication. Therefore applications should not save any sensitive information on the clipboard, because a rogue application could potentially gain access to the sensitive information.

Always use system bitmaps from a trusted source

You must always use system bitmaps from a trusted source in your run-time image, because a malicious bitmap file in the run-time image can potentially threaten the security of your device.

Default Registry Settings

You should be aware of the registry settings that impact security. If a value has security implications, you will find a Security Note in the registry settings documentation.

For GWES registry information, see GWES Registry Settings.

Ports

No specific ports are used for GWES.

See Also

Graphics, Windowing and Events

Send Feedback on this topic to the authors

Feedback FAQs

© 2006 Microsoft Corporation. All rights reserved.