Linked by Thom Holwerda on Fri 27th Apr 2007 18:23 UTC, submitted by dylansmrjones
Windows Despite all the anti-malware roadblocks built into Windows Vista, a senior Microsoft official is lowering the security expectations, warning that viruses, password-stealing Trojans and rootkits will continue to thrive as malware authors adapt to the new operating system. "There is no guarantee that malware can't hijack the elevation process or compromise an elevated application," Russinovich said after providing a blow-by-blow description of how UAC works in tandem with Internet Explorer (with Protected Mode) to limit the damage from malicious files. Even in a standard user world, he stressed that malware can still read all the user's data; can still hide with user-mode rootkits; and can still control which applications (anti-virus scanners) the user can access.
Thread beginning with comment 234583
To read all comments associated with this story, please click here.
So ... Excercise caution
by ma_d on Fri 27th Apr 2007 18:46 UTC
ma_d
Member since:
2005-06-29

So the lesson is to continue to be cautious with what you do in life because the majority of the other people out there would love to take advantage of your mistakes; and a few of them know how to.

It's always an interesting trade off with security: Convenience verse privacy. The important question will be whether or not the malicious programs will need events that we can clearly blame on the users: For example, visiting "installviruses.com" is not an event we should blame on users. Clicking "ok, install" at "installviruses.com" is an event we should blame on users.

You obviously want programs to be able to easily read your data, otherwise work could get too restrictive to be productive. But not every application: You don't want your browser accessing your drive except through explicit circumstances.

I still believe UAC may be one of the better things Microsoft has tried to do along the lines of Windows security, but I haven't researched it (and may not) enough to know if they've really done a proper job of it.

One thing that seems to be universally missing in UAC systems is a useful method of telling the user exactly which application is requesting the authentication. OS X has an easy way to show it (which they don't actually use) by checking the menu bar. Vista could color the windows associated with that process. Gnome could probably do something similar.

Reply Score: 4

v RE: So ... Excercise caution
by casuto on Fri 27th Apr 2007 18:52 in reply to "So ... Excercise caution"
RE: So ... Excercise caution
by suryad on Fri 27th Apr 2007 21:28 in reply to "So ... Excercise caution"
suryad Member since:
2005-07-09

Agreed....I just dont care for antiviruses or antispamware software etc. If you are using Windows use a LOT of caution you will be fine. If you are using OS X use a LESSER amount of caution because of its Unix roots. On Linux use a bit of caution or NONE and you would still be fine.

Been using the smae install for XP on my laptop for about a year now...tweaked....nLited...services disabled...using IE 6 as a browser...no antispyware antivirus....if you would believe me or not I dont care but 0 issues. All I do is a ccleaner once a month, after Windows update, defrag at that time and reboot once after offline defrag. Thats it....rest of the time, I am gaming, watching movies, doing my work etc no problems. XP and Vista CAN be made awesoem for your own needs just need a bit of patience and a bit of care and a bit of knowledge and a lack of desire to go to questionable websites for pr0n. If you do the above you will be fine.

Reply Parent Score: 1

RE[2]: So ... Excercise caution
by whartung on Fri 27th Apr 2007 22:40 in reply to "RE: So ... Excercise caution"
whartung Member since:
2005-07-06

I just wish there was some transparency to the install process.

I tried to install that 3D model tool from Google (forget the name) on my Mac, and rather than having Ye Olde "Drag n Drop" install, it wanted root access.

Now, of course, I have no idea why it wanted it, and I basically refused to continue the install. It made no sense to me why a 3D modeling program would need root, and I, unfortunately, place Google in the realm of many other vendors in terms of them installing crap on my system I don't want (no, I don't want Google desktop or google toolbar or any other google thing plunging its tentacles in to the depths of my system).

Now, of course, if I had some reasonable explanation as to WHY they wanted root to install a 3D program, I may well have let it through.

But the problem with Windows has long been it's requirement that most everything needed admin to install (or even just to run), so as a user you pretty much had to blindly say "OK" and give every installer admin access (if you hadn't just given up and run in admin mode already anyway).

On the Mac, tho, I'm suspicious of any program that needs root to be installed. It's a bad habit to get in to, and Mac developers shouldn't "just do it" "just in case".

Reply Parent Score: 1