摘要 |
In an embodiment of isolation environment-based information access, programs-including operating systems and applications-running on a computing-based device can be isolated in an environment such as a virtual machine. Information including commands and/or data transmitted between the computing-based device and the program(s) being run, as well as information associated with the program(s) and the computing-based device, is accessed without being detected by the program(s). In one implementation, the information includes state information as well as commands and/or data-including sensitive information, such as usernames and passwords. In another implementation, the information can be used to secretly access the program(s).
|