What can be done to avoid DLL hijacking for a Powerbuilder application in a Windows environment.
Files may be signed using Microsoft sign tool but this will not protect from hijacking unless you somehow use verify to check the
files but I am not sure how feasible this would be.
Any ideas there are functions like LoadlibraryEx (specify path and file) but how would this work in a PB environment and would it be feasible ?
Also on the security tab of a project, I can use the following which means the application must Authenticode signed
Allow access to protected system UI
Select if the application needs to drive input to higher privilege windows on the desktop, such as an on-screen keyboard. Microsoft provides this setting for user interface Assistive Technology (Section 508) applications.
If you check this box, the application must be Authenticode signed and must reside in a protected location, such as \Program Files\ or \windows\system32\.