TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Randall Parker
from: Rich
date: 2003-11-04 22:33:14
subject: Re: MS - Longhorn? - Security Trust

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0395_01C3A323.A282A680
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   That would be strange since Microsoft implemented a mechanism to =
support this years ago.  Look up SAFER =
(http://msdn.microsoft.com/library/en-us/security/security/safer.asp) = and
restricted tokens.  It was largely mooted for email by the changes = to
disallow opening any attachment that is unsafe.  While there are = still
folks that continue to use old versions of software while still = failing
to exercise any caution, recent trojans include instructions for = people
to save attached zip files, extract the programs, then run then = and as
surprised as you might be, people still do it.  There are also = examples
of people being directed to the web to download the trojans = taking the
email program and the restrictions it imposes out of the = loop.  The major
weakness is and has always been the end user, = particularly those that are
naive or too trusting.

Rich

  "Randall Parker"
 =
wrote in message news:3fa86780{at}w3.nls.net...
  Hey, when I suggested a couple of years back that email programs ought =

  to have a way to launch an attachment automatically into a separate =
and=20
  more restricted account the reaction I got from a certain MS guy was=20
  fairly negative if memory serves.

  I still think it is a good idea.

  Rich Gauszka wrote:

  > from
  > =
http://www.internetwk.com/breakingNews/showArticle.jhtml?articleID=3D1580=
0670
  >=20

  > Longhorn will include security technology called the Next Generation
  > Computing Base that's supposed to wall off some software programs =
from
  > important parts of the Windows operating system. But IT managers =
will still
  > have to decide how to write into software policies that deal with =
when to
  > grant download rights and how to phrase questions to users, Rudder =
says.
  >=20

------=_NextPart_000_0395_01C3A323.A282A680
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   That
would be strange =
since Microsoft=20
implemented a mechanism to support this years ago.  Look up SAFER
= (http://msdn.microsoft.com/library/en-us/security/security/safer.a=
sp">http://msdn.microsoft.com/library/en-us/security/security/safer.asp=
A>)=20
and restricted tokens.  It was largely mooted for email by the =
changes to=20
disallow opening any attachment that is unsafe.  While there are = still=20
folks that continue to use old versions of software while still failing = to=20
exercise any caution, recent trojans include instructions for people to = save=20
attached zip files, extract the programs, then run then and as surprised = as you=20
might be, people still do it.  There are also examples of people = being=20
directed to the web to download the trojans taking the email program and = the=20
restrictions it imposes out of the loop.  The major weakness is and = has=20
always been the end user, particularly those that are naive or too=20
trusting.
 
Rich
 

  "Randall Parker" <STOPt=">mailto:STOPtechieSPAMpunditNOW{at}STOPfutureSPAMpundit.comNOW">STOPt=
echieSPAMpunditNOW{at}STOPfutureSPAMpundit.comNOW>=20
  wrote in message news:3fa86780{at}w3.nls.net...He=
y, when=20
  I suggested a couple of years back that email programs ought to =
have a way=20
  to launch an attachment automatically into a separate and more =
restricted=20
  account the reaction I got from a certain MS guy was fairly =
negative if=20
  memory serves.I still think it is a good
idea.Rich =
Gauszka=20
  wrote:> from> http://www.internetwk.com/breakingNews/showArticle.jhtml?articleI=
D=3D15800670">http://www.internetwk.com/breakingNews/showArticle.jhtml?ar=
ticleID=3D15800670>=20
  > Longhorn will include security technology
called the Next =

  Generation> Computing Base that's supposed to wall off some =
software=20
  programs from> important parts of the Windows operating system. =
But IT=20
  managers will still> have to decide how to write into software =
policies=20
  that deal with when to> grant download rights and how to phrase =

  questions to users, Rudder says.> =


------=_NextPart_000_0395_01C3A323.A282A680--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.