M
Mr. Arnold
http://www.betanews.com/article/New_Norton_Vista_tool_trades_UAC_for_online_feedback/1223668881
There was another one presented here a couple of months ago.
There was another one presented here a couple of months ago.
Mr. Arnold said:http://www.betanews.com/article/New_Norton_Vista_tool_trades_UAC_for_online_feedback/1223668881
There was another one presented here a couple of months ago.
Gordon said:Why would any NORMAL person need a UAC tool? Apart from those who just
tinker with their machines and don't actually do any WORK with them?
FromTheRafters said:Leave it to Symantec to "give the people what they want"
with no regard for the security implications.
mike-cow said:If I *really* wanted secure, I wouldn't use windows at all. Do you
REALLY trust microsoft to keep your data safe? I know I don't.
If I *really* wanted secure, I wouldn't use windows at all. Do you
REALLY trust microsoft to keep your data safe? I know I don't.
I use this tool, and it's *definetely* worth the "risk". I don't need
to disable the prompts entirely, and I dont need to see the darn thing
every single time I want to open up a command prompt (as I always run
the prompt elevated).
Yes it would be, but I'm not running cmd. Cygwin ftw! 'Cygwin
Information and Installation' (http://www.cygwin.com/)
Ofcourse... *If* the malware knows where to find it... Security by
obscurity works well on software.
Remember, this isn't a new thing, user permissions have been around in
Microsoft operating systems since the mid 90s. Any author who hasn't
caught on yet needs some encouragement, and nothing quite like user
pressure to make it happen.
mike-cow said:Ofcourse... *If* the malware knows where to find it... Security by
obscurity works well on software.
Mr. Arnold said:I wouldn't use the thing. It's about as bad as Application Control in 3rd
party personal FW(s) or other such nonsense snake-oil solutions. One wants
the mouse click on the accept button when it's malware that was *accepted*
and remembered so that one is not asked about it again.
It's just below this one. Hey, I turned UAC off, because I have ran this
way for 25 years from Win 9'x as root admin, and I have ran as user/admin
on Win NT 4.0, Win 2k, and XP with full admin rights.
I am good man. I am so good, computer savvy, and it can't happen to me on
the Internet. Hey, so what if I get some malware that something detected.
I'll wipe out the machine if it happens.
But little did I know that a whole boat load of malware has come past my
little security blanket, planted itself deep and can't be detected by my
detection security blanket, and it's been this way for a long time.
I don't even know how to go check things out for myself with other tools
manually and look around and see what is running on the machine from time
to time.
Hey, I am good and my security detection blanket is good too. Everything
is okay-dokey!
mike-cow said:I don't have much to comment on this issue anymore, but I'd like to ask
you a question:
Do you wear a helmet when riding your bike? (the question is void if
it's required by law though...)
Yeah, like 99% of the users having problems with UAC contact the
software authors.
Riiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiight.
Dream on.
Maybe not, but the results speak for themselves, take a look at
http://blogs.msdn.com/e7/archive/2008/10/08/user-account-control.aspx
The "Number of unique applications and tasks creating UAC prompts" line
speaks for itself, having gone from 800,000 to a little under 200,000 in
a 12 month period.
Those results don't say (as in "speak for themselves") that the
reduction is because of a surge of user complaints to software
developers as you initially implied.
You missed TWO other possibilities, each more credible than yours, and
each clearly explained in the article:
Quoting from that article:
"... we also expect that as people use their machines longer they are
installing new software or configuring Windows settings less
frequently, which results in fewer prompts, or conversely when a
machine is new that is when there is unusually high activity with
respect to administrative needs."
Also:
"Customer Experience Improvement Program data indicates that the
number of sessions with one or more UAC prompts has declined from 50%
to 33% of sessions with Vista SP1."
FromTheRafters said:Yes, one might as well just silently elevate as with UAC turned off.
Allowing UAC to partially function is just lending users a false sense
of security. True, other aspects of UAC still enhance security if this
portion is circumvented, but the false belief that a whitelist won't be
abused by malware is damaging.
Mr. Arnold said:You might find some interesting reading here about Vista's kernel.
http://technet.microsoft.com/en-us/magazine/cc162458.aspx
<http://www.securitypronews.com/news/securitynews/spn-45-20060601ASLRJoinsVistasBagOfTricks.html>
You know, I just don't see posts about malware issues with Vista users
that much.
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.