
docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security
Preview meta tags from the docs.microsoft.com website.
Linked Hostnames
9- 11 links todocs.microsoft.com
- 6 links tolearn.microsoft.com
- 2 links togo.microsoft.com
- 2 links towww.microsoft.com
- 1 link toaka.ms
- 1 link togithub.com
- 1 link tosupport.microsoft.com
- 1 link totechcommunity.microsoft.com
Thumbnail

Search Engine Appearance
Dynamic-Link Library Security - Win32 apps
When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.
Bing
Dynamic-Link Library Security - Win32 apps
When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.
DuckDuckGo
Dynamic-Link Library Security - Win32 apps
When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.
General Meta Tags
49- titleDynamic-Link Library Security - Win32 apps | Microsoft Learn
- charsetutf-8
- viewportwidth=device-width, initial-scale=1.0
- color-schemelight dark
- descriptionWhen an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.
Open Graph Meta Tags
6- og:typewebsite
- og:image:altMicrosoft Learn
- og:imagehttps://learn.microsoft.com/en-us/media/open-graph-image.png
- og:titleDynamic-Link Library Security - Win32 apps
- og:urlhttps://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security
Twitter Meta Tags
2- twitter:cardsummary_large_image
- twitter:site@MicrosoftLearn
Link Tags
6- canonicalhttps://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security
- dns-prefetch//target.microsoft.com
- dns-prefetch//microsoftmscompoc.tt.omtrdc.net
- preconnect//mscom.demdex.net
- preload/static/third-party/adobe-target/at-js/2.9.0/at.js
Links
26- https://aka.ms/yourcaliforniaprivacychoices
- https://docs.microsoft.com/en-us/windows/desktop/SbsCs/manifests
- https://docs.microsoft.com/en-us/windows/desktop/SysInfo/getting-the-system-version
- https://docs.microsoft.com/en-us/windows/desktop/api/LibLoaderAPI/nf-libloaderapi-adddlldirectory
- https://docs.microsoft.com/en-us/windows/desktop/api/LibLoaderAPI/nf-libloaderapi-loadlibraryexa