By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
This tag-based approach made my messy file system searchable without moving a single file ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results