GWES Security (Windows CE 5.0)
It is important always to use secure coding techniques while you work with the GWES functionality in Windows CE.
For more information about Windows CE security services, see Enhancing the Security of a Device.
Best Practices
Do not save sensitive information on the clipboard
By design, the clipboard serves as a mechanism for interprocess communication. Therefore applications should not save any sensitive information on the clipboard, because a rogue application could potentially gain access to the sensitive information.
Always use system bitmaps from a trusted source
You must always use system bitmaps from a trusted source in your run-time image, because a malicious bitmap file in the run-time image can potentially threaten the security of your device.
Default Registry Settings
You should be aware of the registry settings that impact security. If a value has security implications, you will find a Security Note in the registry settings documentation.
For GWES registry information, see GWES Registry Settings.
Ports
No specific ports are used for GWES.
See Also
Graphics, Windowing and Events
Send Feedback on this topic to the authors