By accessing named file streams it's possible to access protected file data.
vulners.com/securityvulns/securityvulns:doc:7849