execution .Authentication can simply be bypassed by replacing this file with cmd.exe
using a liveCD like Backtrack or direct logging and entering windows explorer (Vinoo,
2007). Moreover, Vista activation mechanism has been broken almost one year after its
official release. The same security scenario applies to Windows seven. This operating
system can be bypassed in the same way as Windows Vista (using the installation disk
and entering recovery mode); furthermore online news of a zero day attack are spreading
around. Certainly, this poor security performance of Microsoft Windows, the most used
operating system worldwide, does not sound promising for ICT and its future.