I want FULL CONTROL NOW!!!

  • Thread starter Thread starter Guest
  • Start date Start date
jonah said:
On Sun, 1 Apr 2007 09:36:01 -0700, amenx However having now removed
all the security offered by Vista it begs the question why noiot use
XP instead.

You know, I think you guys who make that statement, have to be a bit
careful. What you are saying in essence, is "There is nothing else to Vista
than the UAC". While I don't view some of the new features as all that
great, don't you think dismissing Superfetch, readyboost, the sidebar, bread
crumbs, A locked Admin account, IE7 in protected mode, moving the video
driver to user mode, the pretty new Aero shell and DX10 a bit harsh ?

Or do you really feel that the UAC is all Vista has to offer over XP ?
 
Oh, one more thing. After you disable UAC and give yourself admin
permissions for everything (and ownership), make sure your password is
blank. That oughta take care of everything. LOL!

-Frank
 
I don't get it ? What does turning off the UAC have to do with using a
blank password ?
 
You know, I think you guys who make that statement, have to be a bit
careful. What you are saying in essence, is "There is nothing else to Vista
than the UAC". While I don't view some of the new features as all that
great, don't you think dismissing Superfetch, readyboost, the sidebar, bread
crumbs, A locked Admin account, IE7 in protected mode, moving the video
driver to user mode, the pretty new Aero shell and DX10 a bit harsh ?

Or do you really feel that the UAC is all Vista has to offer over XP ?

As I've said many times now, overall, I like Vista. Sure I complain
about what's broke, especially UAC, that's just human nature. My
opinion, Microsoft totally dropped the ball. You know what they say
about first impressions. You only get ONE chance to make one.

Sadly, for MANY people the first impression they will get of Vista is
what the #$#($#$, I can't do what, permissions, what permissions, I'm
the $#($(#$ administrator, what do I need permissions for, blah, blah,
blah.

1. First UAC is poorly implemented. If you are honest with yourself
we all know that's true. That's strike one.

2. UAC is poorly documented. Yea, I now if you hunt around it is
explained, sort of, but even if you have a technical background
again being honest, you read what's said two, three times and
still it is confusing. Imagine poor Joe Average. That's strike two.

3. The final straw for me is taking the time to view that very
telling 64 minute webcast interview with the two principle
Microsoft engineers that developed UAC. I don't blame them,
they're pretty truthful and sort of spill the beans in that
interview. They admit, oh we know we caught hell for UAC, not
just from outside developers, but from INSIDE Microsoft, even
Billy, the man himself had doubts. Oh and by the way we know
it isn't perfect, far from it. So in a very sheepish way they
say hey we know, please tell us about it if it causes you
problems it isn't suppose to. That's strike three.

Sure Vista has some nice improvements. You mentioned some of them. But
its like when you buy a new car spend maybe 30K or more and on the way
home there's a squeak in the dashboard or maybe the driver's window
doesn't close right and your curse the car, the dealer and you're
uncle Louie for talking you in to buying it. It's just human nature.

If Vista gets less than a warm reception Microsoft has nobody to blame
but themselves for sneaking in something as drastic a change as UAC
and not warning customers what was coming, not explaining it and
making it way too difficult you use for the average user. For a
company known for it's clever marketing they blew it big time and I
bet Billy knows it. Matter of fact I KNOW he does. That he may not
care as much as he once would have could be true too. He's busy now
trying to give his money away to charity. ;-)
 
OK, I think I'm getting there, great link on how to get "Full Control:
http://www.fastfs.com/help_pages/vista_full_admin.htm

Tested it out in Safe Mode (where a 'full adminstrator' account is
'supposed' to work unhindered). Managed to change the permissions after
getting ownership, but was unable to delete the DVDSyles folder in Movie
Maker, you still have to go in and change permissions for each file,
subfolder, BUT was at least able to do that where before it was 'access
denied'. Again, its not so much this folder or its bulky contents that irks
me, but the issue of 'freedom' to do WHATEVER I want on my PC. Good thing I
learned was you can easily enable/disable the full admin account so 2
accounts dont show up on logon.

Cheers,
amenx
 
Total opportunity for someone to take control of said computer?????

--


Regards,

Richard Urban MVP
Microsoft Windows Shell/User
 
They could have used a similar procedure to what Linux uses. If you want
to make a system change, enter your root password. I have explained this
function to a number of people. It is easy to understand. We want to
protect the system files, just enter your password and take control.
Once you are aware that your actions can affect your system, you do not
need constant reminders and additional permissions.


If Vista gets less than a warm reception Microsoft has nobody to blame
 
But a window pops up and asks you to type your root password - every time
you go to the function you are trying to use, does it not. It constantly
tells you to put in your password. You can not tell the system that you
don't want this to happen. It is controlled by the system security. Damn -
that's so aggravating - and how is it different than Vista?
--


Regards,

Richard Urban MVP
Microsoft Windows Shell/User
 
Hey, I have had you trying to stop people altering THEIR computers to how
THEY wnat them to run. Stop dealing in scaremongering.
Anti-viruses have no probs with it turned off; don't come the raw prawn with
me mate
You are microsoft, through and through
 
You are another microsoft stooge, that tries to scare people that want to
alter THEI R computer settings and programs.
Than heavens there are some of us out here that know more than you do!

Mick Murphy in Australia
 
When I use synaptic, the access program for the software archives and
updates, it asks for my root password. Or if I want to create binaries
with make. Or install vmware. Or use konqueror in superuser mode. I
cant think of much else. It only asks once and then its clear sailing. I
might type it in once a day on the average for various tasks. No, it is
not like Vista. It does not pause my entire system and darken the
screen. It does not nag. It does not keep asking me the same type of
questions over and over again. If I am the superuser, it figures that I
know what I am doing. Although it is not recommended, I can also log in
as root, if I have a lot of maintenance activities to do, but I havent
even thought about doing that. I havent even felt the need to log in as
root and bypass the simple password system, not like many Vista users who
turn off UAC.
 
Hey, I have had you trying to stop people altering THEIR computers to how
THEY wnat them to run.

I'm not trying to scare anyone, nor am I telling them how to or not to alter
their pc, I'm simply stating what is known. It's already been demonstrated
that some programs - and this does include some popular AV programs - will
not function properly with UAC disabled. Before recommending doing this to
anyone, they should be told of the possible implications.
You are microsoft, through and through

Ha! If only you knew.....

--
Best of Luck,

Rick Rogers, aka "Nutcase" - Microsoft MVP

Windows help - www.rickrogers.org
 
If we remain diligent and committed, I really think this should work: We
coordinate a specific day and time, then make arrangements to visit a minimum
four story building. At the agreed upon time, we take our new vista laptops
to the fourth story, open the window, shout that we are fed up and we're not
going to take it anymore, then throw the laptop to the ground below (watching
for pedestrians). We then collect the remains of our laptops, go home, then
call the credit card company we used to make this purchase and tell them we
are disputing the charges and will be returning the recovered software to
Microsoft.
 
You know, I think you guys who make that statement, have to be a bit
careful. What you are saying in essence, is "There is nothing else to Vista
than the UAC". While I don't view some of the new features as all that
great, don't you think dismissing Superfetch, readyboost, the sidebar, bread
crumbs, A locked Admin account, IE7 in protected mode, moving the video
driver to user mode, the pretty new Aero shell and DX10 a bit harsh ?

No all the above is either eye candy or useless rubbish (IE7)
Or do you really feel that the UAC is all Vista has to offer over XP ?
Yes and its a backward step, I have had everything and more offered by
Vista for years on Macs and Linux implemented in a far better way.

No I don't say that is all Vista has to offer, but the OP wants more
control and less "Can't do that" dialogues. He has been told how to
disable UAC and run with a full admin account instead, I specifically
pointed out that this disables all of Vista' security bringing it back
to the level of XP - therefore why bother with Vista in the first
place .

There is a lot more to Vista most of which I personally do not want -
you have named most of these features. Except Readyboost which is
pretty damn good.

And I like Microsoft Windows but I am never going to use Vista as a
primary O/S for many reasons, it will stay on a test box where it
belongs until MSFT gets a version out worth using - Vienna possibly?

Jonah
 
In message <[email protected]> Bill
When I use synaptic, the access program for the software archives and
updates, it asks for my root password. Or if I want to create binaries
with make. Or install vmware. Or use konqueror in superuser mode. I
cant think of much else. It only asks once and then its clear sailing. I
might type it in once a day on the average for various tasks. No, it is
not like Vista. It does not pause my entire system and darken the
screen.

Which is a design flaw -- How do you know if you're talking to the OS or
the app? And once an app does trick you into entering your root
password, what stops that app from then using your credentials without
your permission?

Under Windows, even if an app has your password, it still can't use it
to elevate without going through the secure desktop.
It does not nag. It does not keep asking me the same type of
questions over and over again. If I am the superuser, it figures that I
know what I am doing. Although it is not recommended, I can also log in
as root, if I have a lot of maintenance activities to do, but I havent
even thought about doing that. I havent even felt the need to log in as
root and bypass the simple password system, not like many Vista users who
turn off UAC.

You can start a command prompt elevated in Windows, just like Linux.
Once you do that, you can do whatever you want in that command prompt
without being prompted again, including launching other programs
elevated.

The functionality is almost identical, only the implementation is
different.

Windows is arguably more annoying, but this is largely because of legacy
compatibility -- Windows steps in when you're doing something that might
require elevated access and elevates automatically. This will happen
less frequently as apps are updated to not elevate unless they
specifically need to be elevated, rather then Windows guessing.
 
I have never had that experience and I doubt that any other Linux user
has had it either. Apps just don't pop up and ask for your password.
You have to start them first. You have to intentionally decide to do
something in superuser mode. In general, you install programs from
secure archives. If the superuser request for a password popped up on
its own, you would figure that you were under attack. That has never
happened. This is not Windows. There is no parallel to Windows.
Windows copied some of the features of Linux, but did not copy the
underlying security model. It is still Windows. You can attempt to
hypothesize all day...but you are comparing two Windows models...and not
a Windows and Linux model. Linux does not use a central registry.
Programs have their own hidden dir in the user space. If someone could
compromise your browser, you only have to shut down the program, remove
the dir, and restart the program to restore it to its original
configuration. The offending attacker is blocked from the system files.
But this is only speculation. It has never happened to me yet.
 
DevilsPGD said:

Not entirely true, I have Ubuntu 6.10 installed on another box and I was
surprised to see it pop up a password box with the screen dimmed when I went
to install updates.
It surprised me, because I had used an earlier version of Ubuntu, and the
screen dimming or password wasn't an issue at that time.
 
You are right. I remember seeing that when I tested Ubuntu. I still dont
like it. It is similar to when you logged in as root on a mandrake
system and the screen turned red. All this drama...
 
In message <[email protected]> Bill
I have never had that experience and I doubt that any other Linux user
has had it either. Apps just don't pop up and ask for your password.
You have to start them first.

The same is true of Windows -- You start an app that needs
administrative privileges, it will task.

If an app is written to elevate during operation, that's possible too.
As of yet, most apps don't have this capability, so the elevation takes
place at the start.
You have to intentionally decide to do
something in superuser mode.

Sure -- This was already possible in previous versions of XP (and is
possible in Vista too, if you so desire). Vista simplifies things by
elevating automatically, rather then getting half way into an installer
only to find out you need to be elevated, the installer isn't written to
elevate part way through, and you have to start over.
In general, you install programs from
secure archives.
Indeed.

If the superuser request for a password popped up on
its own, you would figure that you were under attack.

The same is generally true in Windows -- A UAC popup on it's own
indicates something unexpected is happening. Unexpected is usually bad.
That has never
happened. This is not Windows. There is no parallel to Windows.
Windows copied some of the features of Linux, but did not copy the
underlying security model.

huh?

The base security model has been there since the beginning of the NT
line and is fairly similar to the unix security model.

The difference is that between backward compatibility to the 9x line,
and continuing support for poorly written apps, it wasn't especially
feasible to running as a limited user most of the time.

This would be similar to any linux environment where the user runs as
root at all times because several user apps that users "can't live
without" only run as root, and "su" is too hard for users.

The core OS, and virtually all of Microsoft's software run just fine as
limited users, and have since the 2000 versions (earlier, probably,
although I ran precious little MS software other then the OS under NT4)
It is still Windows. You can attempt to
hypothesize all day...but you are comparing two Windows models...and not
a Windows and Linux model. Linux does not use a central registry.

How is the registry involved here?

You are aware that the registry's security controls are as granular and
as tight as the file system, right?
Programs have their own hidden dir in the user space. If someone could
compromise your browser, you only have to shut down the program, remove
the dir, and restart the program to restore it to its original
configuration.

That is far from true -- A compromised app running on Linux has access
to more then just it's own configuration files, it will generally have
access to most of the same files you do, unless the app is explicitly
locked down. When I login to my Linux box here, I can easily view or
edit any file in my user directory. I can modify at my fire fox
refs.DJs file from a text editor, for example. Say I found a buffer
overrun in my text editor of choice that would execute arbitrary code,
and I tricked you into opening a text file that triggered the buffer
overrun, and had my arbitrary code add some lines to Fire fox's refs.DJs
file to reload the exploit automatically. What exactly in Linux's
security model prevents this, assuming a buffer overrun or other
compromise in one arbitrary app?

Most trojans/viruses these days only need to run, and to have outbound
port 25 access, no more and no less. They don't care about your data,
they don't care about your system, that's just gravy, all they really
want to do is what economically benefits the author. If there were
enough Linux users out there stupid enough to launch random binaries
from untrusted sources, we'd see far more exploits targeted to that
market.

The percentage of Linux boxes is almost too small to be worth a
spammer's time to pay a coder to write the code, and the percentage of
linux users dumb enough to fall for "This is your ISP, run the attached
file or your internet will be cut off" isn't exactly overwhelming
either, they're simply not Linux users since Linux isn't a choice in
most cases.
The offending attacker is blocked from the system files.
But this is only speculation. It has never happened to me yet.

This is true in Vista, and every Microsoft OS since NT3.51 (or earlier,
that's as far back as my experience with NT goes) -- As long as you run
as a limited user, rather then an administrator, you cannot modify
system binaries, or even installed applications. The only files you can
write to are dedicated to your own use (out of the box)
 
Thanks for asking, I'll try to explain it (again) to those who don't
understand
why UAC is so FUBAR in Windows, and works so well in *nix systems:

When you want to perform any maintenance operations that require
administrative
control in Linux or OS X the system DOES indeed pop up a window and
ask for
your password. It then gives you several minutes in which it assumes
that since
you typed your password, you are who you say you are, and you can it
won't
bother you again. After those few minutes are up, and if you do
something else
requiring administrative elevation, it asks for the password again.

Do you see how this is better? Rather than popping up a box EVERY
SINGLE TIME
you do an admin task, it does it once, and then doesn't do it again
for a few
minutes. It doesn't just ask for a monkey to press a button in a
dialog box, it
actually requires your password. So it knows that the person
requesting elevation
is at least someone with the admin password. If you have several
things you
need to do in a short amount of time (which is typically the case for
admin tasks)
then you only get one popup.

SO, UAC in Linux and OS X is BOTH More secure (requesting a password)
and Less
annoying.

How can anyone NOT see the advantage of that?
 
Back
Top