Reply to post: Re: "a tool Microsoft uses to hide its source code from being copied"

Windows Registry-infecting malware has no files, survives reboots

Steve Graham

Re: "a tool Microsoft uses to hide its source code from being copied"

Not "alone", really. For example, the Gnome infrastructure in Linux is based on a binary "registry" which needs specific tools to access it.

I think human-readable configuration files (even XML) are always a better and more resilient approach.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon