| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Legacy setup program behavior |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_06B9_01C75470.2F0CB220
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
This has no relevance to malware.
Rich
"Rich Gauszka" wrote in message =
news:45da8a0b$1{at}w3.nls.net...
I can understand why the criticism though as when one is the dominant=20
vendor as is Microsoft one is also the chief target of Malware. I tend =
to agree with the views expressed in the blog below
http://blogs.zdnet.com/Ou/?cat=3D8
While it's true that Vista UAC is no different from Mac or Linux=20
privilege escalation, we must remember that the old argument that=20
"everyone else is doing it" just doesn't cut it when you're the most=20
dominant desktop operating system in the world and the biggest target=20
for Malware. While Vista's security record in the first three months=20
(referring to enterprise and MSDN rollout) in public has been stellar =
by=20
any standard on any operating system, we have to expect that Malware=20
pushers will be using a lot more social engineering as their weapon of =
choice against Vista once it inevitably becomes the dominant operating =
system led by the retail sector. There are simply too many people=20
downloading "warez" (pirated software), applications and games that=20
people think will be cool to try out, and "free" adult videos that=20
require one of those "special" root me Codecs in order to
"play" and=20
your average Joe or Jane won't know any better. While one might be=20
tempted to say "it's their problem", it eventually becomes everyone's=20
problem because those suckers become a massive army of zombies that =
can=20
spew spam and DDoS (Distributed Denial of Service) attacks.
What Rutkowska suggests is that UAC should have more than just a =
yes/no=20
option on privilege escalation but a yes, limited yes, and no option.=20
Under Windows XP, Rutkowska is able to run as a limited user with add=20
only privileges to the "Program Files" directory and the HKLM Software =
registry hive but Vista takes this choice away from her because of the =
way that UAC works. I would add to that add only permissions list the =
"Public Desktop" so that launch icons can at least be installed for=20
everyone. The vast majority of applications shouldn't need any more=20
privileges than what's listed here and they certainly shouldn't ever=20
have the ability to modify the OS kernel unless they're signed by a=20
trusted Certificate Authority. If Microsoft would adopt this as the=20
standard permission model for the vast majority of applications then =
it=20
would vastly improve the Trojan Malware situation
Rich wrote:
> This is entirely an app compat issue for legacy installers not=20
> anything that should be relevant as ISVs release new products. =
There is=20
> a mechanism defined for any application to declare its elevation=20
> behavior and one specifically for installers that use Windows=20
> Installer. See=20
> http://msdn2.microsoft.com/en-us/library/aa372468.aspx for Using =
Windows=20
> Installer with UAC. See=20
> http://msdn2.microsoft.com/en-us/library/aa480150.aspx for info on=20
> developing applications. The Certified for Windows Vista logo =
requires=20
> that all EXEs declare their execution level. See=20
> =
http://download.microsoft.com/download/8/e/4/8e4c929d-679a-4238-8c21-2dcc=
8ed1f35c/Windows%20Vista%20Software%20Logo%20Spec%201.1.doc.
> =20
> Rich
> =20
>=20
> "Rich Gauszka" * Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.