In the previous entries to Security Through Process Isolation (Part1 Part2 Part3 Part4), I focused on the file system aspects of process isolation. In the next few entries I will work through the details associated with virtualizing the registry access from an isolated process. While registry virtualization is, overall, a less complicated design than file… Continue Reading …