Originally posted by iive
View Post
In other words this specific action requires to override or disable specific security protections designed to block its potential use by malware.
Comment