TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Geo
from: Gregg N
date: 2006-01-02 20:51:40
subject: Re: Kodak EasyShare software

From: Gregg N 

This is a multi-part message in MIME format.
--------------030907000201040109030700
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Geo wrote:
> "Gregg N"  wrote in message
> news:43b97fe5$1{at}w3.nls.net...
>
>
>> It is true that for a single user machine, it is less important
>> (although many households have more than one user on a machine).
>> However, even for a single user, it can be advantageous to run with less
>> than administrative permission. If the malware has administrative
>> permissions, it can do far more insidious damage, such as installing a
>> root kit that prevents you from knowing it is present. It can also
>> access the network in ways you might ordinarily limit yourself (e.g.,
>> raw sockets).
>>
>
> Name one trojan that can't get full control of the machine when first
> executed at user instead of admin level.
>
> Geo. (theory vs reality)
>
>

Name one that can. The only way to get full control is by exploiting an
elevation of permission vulnerability. How many of those have there been?

Gregg


--------------030907000201040109030700
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit




  
  


Geo wrote:

  "Gregg N" <invalid{at}invalid.invalid>">mailto:invalid{at}invalid.invalid"><invalid{at}invalid.invalid>
wrote in message
news:43b97fe
5$1{at}w3.nls.net...

  
  
    It is true that for a single user machine,
it is less
important
(although many households have more than one user on a machine). However,
even for a single user, it can be advantageous to run with less than
administrative permission. If the malware has administrative permissions,
it can do far more insidious damage, such as installing a root kit that
prevents you from knowing it is present. It can also access the network in
ways you might ordinarily limit yourself (e.g., raw sockets).
    
  
  
Name one trojan that can't get full control of the machine when first
executed at user instead of admin level.

Geo. (theory vs reality)

  


Name one that can. The only way to get full control is by exploiting an
elevation of permission vulnerability. How many of those have there
been?

Gregg




--------------030907000201040109030700--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.