Share via


GWES Security (Windows Embedded CE 6.0)

1/6/2010

It is important always to use secure coding techniques while you work with the GWES functionality in Windows Embedded CE.

For more information about Windows Embedded CE security services, see Enhancing the Security of a Device.

Best Practices

Do not save sensitive information on the clipboard

By design, the clipboard serves as a mechanism for interprocess communication. Therefore applications should not save any sensitive information on the clipboard, because a rogue application could potentially gain access to the sensitive information.

Always use system bitmaps from a trusted source

You must always use system bitmaps from a trusted source in your run-time image, because a malicious bitmap file in the run-time image can potentially threaten the security of your device.

Default Registry Settings

You should be aware of the registry settings that impact security. If a value has security implications, you will find a Security Note in the registry settings documentation.

For GWES registry information, see GWES Registry Settings.

Ports

No specific ports are used for GWES.

See Also

Other Resources

Graphics, Windowing and Events (GWES)