TIP: Click on subject to list as thread! ANSI
echo: binkd
to: MICHAEL DUKELSKY
from: MICHIEL VAN DER VLIST
date: 2016-01-27 17:03:00
subject: Feature request

Hello Michael,

On Wednesday January 27 2016 18:11, you wrote to Bj?rn Felten:

 MD> Executables are stored in Program Files but if you work in a
 MD> restricted account, you will not be able to write to Program Files. It
 MD> is done on purpose. If you for example click by accident on a
 MD> reference in a fishing e-mail message and download and run some
 MD> malware while you work in a restricted account, the malware will not
 MD> be able to infect the executables in Program Files. That is why
 MD> application store their data in %APPDATA% and not in %ProgramFiles%.

Oh, c'mon, when was the last time a _Fidonet_ executable was infected by
malware by clicking on a link in a fishing mail?


Cheers, Michiel

--- GoldED+/W32-MSVC 1.1.5-b20130111
* Origin: http://www.vlist.eu (2:280/5555)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.