| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: MS - Longhorn? - Security Trust |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0395_01C3A323.A282A680
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
That would be strange since Microsoft implemented a mechanism to =
support this years ago. Look up SAFER =
(http://msdn.microsoft.com/library/en-us/security/security/safer.asp) = and
restricted tokens. It was largely mooted for email by the changes = to
disallow opening any attachment that is unsafe. While there are = still
folks that continue to use old versions of software while still = failing
to exercise any caution, recent trojans include instructions for = people
to save attached zip files, extract the programs, then run then = and as
surprised as you might be, people still do it. There are also = examples
of people being directed to the web to download the trojans = taking the
email program and the restrictions it imposes out of the = loop. The major
weakness is and has always been the end user, = particularly those that are
naive or too trusting.
Rich
"Randall Parker"
=
wrote in message news:3fa86780{at}w3.nls.net...
Hey, when I suggested a couple of years back that email programs ought =
to have a way to launch an attachment automatically into a separate =
and=20
more restricted account the reaction I got from a certain MS guy was=20
fairly negative if memory serves.
I still think it is a good idea.
Rich Gauszka wrote:
> from
> =
http://www.internetwk.com/breakingNews/showArticle.jhtml?articleID=3D1580=
0670
>=20
> Longhorn will include security technology called the Next Generation
> Computing Base that's supposed to wall off some software programs =
from
> important parts of the Windows operating system. But IT managers =
will still
> have to decide how to write into software policies that deal with =
when to
> grant download rights and how to phrase questions to users, Rudder =
says.
>=20
------=_NextPart_000_0395_01C3A323.A282A680
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
That
would be strange =
since Microsoft=20
implemented a mechanism to support this years ago. Look up SAFER
= (http://msdn.microsoft.com/library/en-us/security/security/safer.a=
sp">http://msdn.microsoft.com/library/en-us/security/security/safer.asp=
A>)=20
and restricted tokens. It was largely mooted for email by the =
changes to=20
disallow opening any attachment that is unsafe. While there are = still=20
folks that continue to use old versions of software while still failing = to=20
exercise any caution, recent trojans include instructions for people to = save=20
attached zip files, extract the programs, then run then and as surprised = as you=20
might be, people still do it. There are also examples of people = being=20
directed to the web to download the trojans taking the email program and = the=20
restrictions it imposes out of the loop. The major weakness is and = has=20
always been the end user, particularly those that are naive or too=20
trusting.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.