| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Legacy setup program behavior |
From: Rich Gauszka I can understand why the criticism though as when one is the dominant vendor as is Microsoft one is also the chief target of Malware. I tend to agree with the views expressed in the blog below http://blogs.zdnet.com/Ou/?cat=8 While it's true that Vista UAC is no different from Mac or Linux privilege escalation, we must remember that the old argument that "everyone else is doing it" just doesn't cut it when you're the most dominant desktop operating system in the world and the biggest target for Malware. While Vista's security record in the first three months (referring to enterprise and MSDN rollout) in public has been stellar by any standard on any operating system, we have to expect that Malware pushers will be using a lot more social engineering as their weapon of choice against Vista once it inevitably becomes the dominant operating system led by the retail sector. There are simply too many people downloading "warez" (pirated software), applications and games that people think will be cool to try out, and "free" adult videos that require one of those "special" root me Codecs in order to "play" and your average Joe or Jane won't know any better. While one might be tempted to say "it's their problem", it eventually becomes everyone's problem because those suckers become a massive army of zombies that can spew spam and DDoS (Distributed Denial of Service) attacks. What Rutkowska suggests is that UAC should have more than just a yes/no option on privilege escalation but a yes, limited yes, and no option. Under Windows XP, Rutkowska is able to run as a limited user with add only privileges to the "Program Files" directory and the HKLM Software registry hive but Vista takes this choice away from her because of the way that UAC works. I would add to that add only permissions list the "Public Desktop" so that launch icons can at least be installed for everyone. The vast majority of applications shouldn't need any more privileges than what's listed here and they certainly shouldn't ever have the ability to modify the OS kernel unless they're signed by a trusted Certificate Authority. If Microsoft would adopt this as the standard permission model for the vast majority of applications then it would vastly improve the Trojan Malware situation Rich wrote: > This is entirely an app compat issue for legacy installers not > anything that should be relevant as ISVs release new products. There is > a mechanism defined for any application to declare its elevation > behavior and one specifically for installers that use Windows > Installer. See > http://msdn2.microsoft.com/en-us/library/aa372468.aspx for Using Windows > Installer with UAC. See > http://msdn2.microsoft.com/en-us/library/aa480150.aspx for info on > developing applications. The Certified for Windows Vista logo requires > that all EXEs declare their execution level. See > http://download.microsoft.com/download/8/e/4/8e4c929d-679a-4238-8c21-2dcc8ed1 f35c/Windows%20Vista%20Software%20Logo%20Spec%201.1.doc. > > Rich > > > "Rich Gauszka"* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.