1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

I turned off UAC

Discussion in 'Windows Vista' started by Justin, Feb 15, 2009.

  1. DanS

    DanS Guest

    Justin <Justin@nobecauseihatespam> wrote in
    news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl:

    (Top-posted for brevity.....)

    Don't you just love it how some people, when they hear you don't like
    something, it's because you don't understand it or how to use it or too
    stupid to understand it.

    How come, I know what it does, I know how it works, I don't like it is
    never good enough for some people. (rhetorical)






    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Jack the Ripper wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Kayman wrote:
    >>>> On Sun, 15 Feb 2009 01:03:01 -0500, Justin wrote:
    >>>>
    >>>>> For various reasons I turned off UAC.
    >>>>> Is there a way I can prevent that bubble in the lower right from
    >>>>> warning me constantly?
    >>>>
    >>>> Five Misunderstood Features in Windows Vista
    >>>> ¡E User Account Control
    >>>> ¡E Image management
    >>>> ¡E Display Driver Model
    >>>> ¡E Search
    >>>> ¡E 64 bit architecture
    >>>>
    >>>> 61-49b1-87ce-6d4a39e83747&DisplayLang=en
    >>>>
    >>>>
    >>>> The User Access Control (UAC) can detect rootkits before they
    >>>> install. AV-Test.org carried on a test of common AV applications to
    >>>> find out how good they detected rootkits. The examiner had to turn
    >>>> off UAC because it detected every rootkit used in the test.
    >>>>
    >>>> Avoiding Rootkit Infection.
    >>>> "The rules to avoid rootkit infection are for the most part the
    >>>> same as avoiding any malware infection however there are some
    >>>> special considerations:
    >>>> Because rootkits meddle with the operating system itself they
    >>>> *require* full Administrator rights to install. Hence infection can
    >>>> be avoided by running Windows from an account with *lesser*
    >>>> privileges" (LUA in XP and UAC in Vista).
    >>>>
    >>>> You should understand the reason why UAC is there. You should read
    >>>> about the two access tokens for user/admin on Vista, and yes, if
    >>>> UAC is disabled,
    >>>> then Run As Administrator is disabled too.
    >>>>
    >>>>

    >>>>

    >>>>

    >>>>
    >>>> Now, listen to the experts and be guided accordingly!
    >>>>
    >>>> Good luck [​IMG]
    >>>
    >>>
    >>> I understand why UAC is there.
    >>> I also understand that it interferes with Firefox/Thunderbird's
    >>> update and the Java updater as well.<!--colorc--><!--/colorc-->
    >>
    >> Interferes as far as what? I have Thunderbird and Java in use, and I
    >> see no interference with UAC enabled, other than you have to approve
    >> the update.<!--colorc--><!--/colorc-->
    >
    > As in when it tried to update, the UAC prompt comes up; I allow it and
    > it still doesn't update.
    >
    > <!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> Do you really know what UAC is about? It's about not allowing a
    >> user-admin to run on the Internet or do anything else as a
    >> full-rights admin like on XP.<!--colorc--><!--/colorc-->
    >
    > I know that.
    >
    > <!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> The admin-user is only a user with Standard user rights, that must be
    >> escalated to admin rights, the escalation to full-admin rights only
    >> last for the moment of escalation to do the task, and then the admin
    >> user is returned to being a Standard user again with Standard user
    >> rights only, not admin rights.<!--colorc--><!--/colorc-->
    >
    > I know that too.
    > <!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> Unlike XP that has no UAC, Vista doesn't allow a virus or malware the
    >> ability to have full rein on the computer once it has compromised the
    >> machine like on XP with a full-rights admin user using the machine.
    >>
    >> Malware or a virus can only run under the context of the user account
    >> that is using the computer. If admin user on Vista is only a Standard
    >> user with Standard user rights in reality that must be escalated to
    >> full admin rights, then that mitigates the damage that can occur
    >> because the virus or malware is not running with full admin rights
    >> with the user that's using an admin account on Vista.<!--colorc--><!--/colorc-->
    >
    > I know that too.
    > <!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> Nothing is bulletproof, but one doesn't see a lot of posts by Vista
    >> users about virus or malware issues, not like you see on XP.
    >>
    >> <!--colorc--><!--/colorc--><!--colorc--><!--/colorc-->
     
  2. DanS

    DanS Guest

    "xfile" <coucou@nospam.com> wrote in
    news:OsuDngDkJHA.4276@TK2MSFTNGP04.phx.gbl:

    The bottom line is that there are millions of users out there and no<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > one including yourself can possibly know each and every one's
    > knowledge and skill level. There are many ignorant computer users,
    > but even more with more than adequate knowledge and skill sets.<!--colorc--><!--/colorc-->

    Are you friggin' kidding me ?!?!?!

    More with adequate knowledge and skill sets than unskilled, computer-
    illiterate ?

    That is completely backwards. Of the typical home PC user, 80% are
    dangerously computer illiterate, 15% are adequate, and 5% are fairly highly
    skilled and knowledgable.
     
  3. Justin wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Jack the Ripper wrote:<!--coloro:green--><span style="color:green <!--/coloro--><!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> I understand why UAC is there.
    >>> I also understand that it interferes with Firefox/Thunderbird's
    >>> update and the Java updater as well.<!--colorc--><!--/colorc-->
    >>
    >> Interferes as far as what? I have Thunderbird and Java in use, and I
    >> see no interference with UAC enabled, other than you have to approve
    >> the update.<!--colorc--><!--/colorc-->
    >
    > As in when it tried to update, the UAC prompt comes up; I allow it and
    > it still doesn't update.<!--colorc--><!--/colorc-->

    And some how, you think this is a UAC problem? When on the same token, I
    do it and I have no problem?
     
  4. DanS wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Justin <Justin@nobecauseihatespam> wrote in
    > news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl:
    >
    > (Top-posted for brevity.....)
    >
    > Don't you just love it how some people, when they hear you don't like
    > something, it's because you don't understand it or how to use it or too
    > stupid to understand it.<!--colorc--><!--/colorc-->

    Which is usually the case.<!--coloro:blue--><span style="color:blue <!--/coloro-->
    >
    > How come, I know what it does, I know how it works, I don't like it is
    > never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->

    This is your pov, which is not good enough.
     
  5. paliometoxo

    paliometoxo Guest

    well for those who only read email and visit a few websites how much
    skill do you really need to do that?[​IMG]


    --
    paliometoxo
     
  6. paliometoxo wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > well for those who only read email and visit a few websites how much
    > skill do you really need to do that?[​IMG]
    >
    > <!--colorc--><!--/colorc-->

    Are you taking to yourself? How much trouble would it be for you to
    learn how to reply post.
     
  7. Jim Moriarty

    Jim Moriarty Guest

    On Mon, 16 Feb 2009 15:27:46 -0600, paliometoxo
    <guest@unknown-email.com> wrote:
    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    >
    >well for those who only read email and visit a few websites how much
    >skill do you really need to do that?[​IMG]<!--colorc--><!--/colorc-->

    That's where all the virus and malware infestations come from you
    boob.
     
  8. DanS

    DanS Guest

    Jack the Ripper <Jack@Rripper.com> wrote in news:ejlXzxHkJHA.4028
    @TK2MSFTNGP03.phx.gbl:
    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    > DanS wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin <Justin@nobecauseihatespam> wrote in
    >> news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl:
    >>
    >> (Top-posted for brevity.....)
    >>
    >> Don't you just love it how some people, when they hear you don't like
    >> something, it's because you don't understand it or how to use it or too
    >> stupid to understand it.<!--colorc--><!--/colorc-->
    >
    > Which is usually the case.<!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> How come, I know what it does, I know how it works, I don't like it is
    >> never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->
    >
    > This is your pov, which is not good enough.<!--colorc--><!--/colorc-->

    Not good enough for ???????
     
  9. On Sun, 15 Feb 2009 12:17:43 +0200, Thegrackfire wrote:
    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Not Even Me wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> "Kayman" <kayhkay-nospam-@operamail.com> wrote in message
    >> news:tkyvtjw916zj.1t5r5ei02wrl4.dlg@40tude.net...<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Now, listen to the experts and be guided accordingly!
    >>> Good luck [​IMG]<!--colorc--><!--/colorc-->
    >>
    >> Most users with a brain don't like the constant nagging of UAC.
    >> As good as the idea may be, the implementation is so poor as to render it
    >> useless.
    >>
    >> <!--colorc--><!--/colorc-->
    >
    > no one seems to have mentioned
    >
    > TweakUACâ„¢ is a free software tool that you can use to quickly turn UAC
    > (User Account Control of Windows Vista) on or off, or to make UAC
    > operate in the quiet mode. This software is FREE, no strings attached.<!--colorc--><!--/colorc-->

    OK, then, I'll mention it :)

    However, in quiet mode, TweakUAC still makes Windows bring up the annoying
    shield that the OP wanted to get rid of.

    I decided not to follow your advice about turning that off, though, in case
    some significant message would eventually be suppressed. Just paranoia, I
    guess.

    --
    Gene E. Bloch letters0x40blochg0x2Ecom
     
  10. Justin

    Justin Guest

    Jack the Ripper wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Justin wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Jack the Ripper wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> +Bob+ wrote:
    >>>> On Sun, 15 Feb 2009 15:43:31 -0500, Jack the Ripper <Jack@Rripper.com>
    >>>> wrote:
    >>>>
    >>>>> Nothing is bulletproof, but one doesn't see a lot of posts by Vista
    >>>>> users about virus or malware issues, not like you see on XP.
    >>>>
    >>>> No, but you do see a lot of posts about how UAC sucks. Good idea, bad
    >>>> implementation.
    >>>>
    >>>
    >>> It's the posts of the ignorant. I would rather have it enabled so
    >>> that I am not on the Internet with full admin rights, like the
    >>> previous versions of the NT based O/S(s,) which are open by default
    >>> O/S(s) and wide-open to attack/compromise by default.
    >>>
    >>> Is that so hard for you or anyone else to understand?<!--colorc--><!--/colorc-->
    >>
    >>
    >> As long as you're not logged on as admin you should be fine. At most
    >> I keep users at Power User rights.
    >> While I understand running as admin is unsafe, simply having the
    >> account enabled is not a security risk.<!--colorc--><!--/colorc-->
    >
    > I am going to try to explain this again. The out of the box admin
    > account on Vista that is given to a user or any subsequent admin account
    > that is created on Vista with UAC enabled is NOT a full-rights-admin
    > account. It's only a Standard user account, which must be escalated to a
    > use the full-adminrights token to do anything requiring
    > admin-full-rights as an administrator.<!--colorc--><!--/colorc-->


    I get it.
    I don't need any escalation to admin. The problem is, what if there's
    some malware. Some malware named "winenhancer." The user sees the UAC
    prompt "Winenhancer must access the internet!" and the user clicks on yes.
    So UAC only works when the user knows everything about the PC, which is
    unrealistic for a standard dumb user whose job is to type out proposals
    and reports.
     
  11. Justin wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Jack the Ripper wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Jack the Ripper wrote:
    >>>> +Bob+ wrote:
    >>>>> On Sun, 15 Feb 2009 15:43:31 -0500, Jack the Ripper <Jack@Rripper.com>
    >>>>> wrote:
    >>>>>
    >>>>>> Nothing is bulletproof, but one doesn't see a lot of posts by
    >>>>>> Vista users about virus or malware issues, not like you see on XP.
    >>>>>
    >>>>> No, but you do see a lot of posts about how UAC sucks. Good idea, bad
    >>>>> implementation.
    >>>>>
    >>>>
    >>>> It's the posts of the ignorant. I would rather have it enabled so
    >>>> that I am not on the Internet with full admin rights, like the
    >>>> previous versions of the NT based O/S(s,) which are open by default
    >>>> O/S(s) and wide-open to attack/compromise by default.
    >>>>
    >>>> Is that so hard for you or anyone else to understand?
    >>>
    >>>
    >>> As long as you're not logged on as admin you should be fine. At most
    >>> I keep users at Power User rights.
    >>> While I understand running as admin is unsafe, simply having the
    >>> account enabled is not a security risk.<!--colorc--><!--/colorc-->
    >>
    >> I am going to try to explain this again. The out of the box admin
    >> account on Vista that is given to a user or any subsequent admin
    >> account that is created on Vista with UAC enabled is NOT a
    >> full-rights-admin account. It's only a Standard user account, which
    >> must be escalated to a use the full-adminrights token to do anything
    >> requiring admin-full-rights as an administrator.<!--colorc--><!--/colorc-->
    >
    >
    > I get it.
    > I don't need any escalation to admin. The problem is, what if there's
    > some malware. Some malware named "winenhancer." The user sees the UAC
    > prompt "Winenhancer must access the internet!" and the user clicks on yes.
    > So UAC only works when the user knows everything about the PC, which is
    > unrealistic for a standard dumb user whose job is to type out proposals
    > and reports.<!--colorc--><!--/colorc-->

    Oh, I get it. It's not the responsibility of the dumb user to know what
    he or she is dumbly clicking on as they point and click. It's their
    responsibly to know the situation, but they don't and most never will.

    However, network admins take that responsibly for this type of worker
    by using a network proxy that only allows the users to go to approved
    sites closing the attack vector and mitigating such damage, as its their
    responsibility to protect company's interest and not some office clerk,
    lock them down.

    Just like with Linux which has the same kind of an approval process
    within its O/S, they point, click, approve and it's all bets are off.
    But with UAC enabled when one does this, the damages are mitigated to a
    certain degree as UAC protects critical areas and also not allowing the
    malware to continuously run under the context of the user-admin
    full-rights access token, to spread damage.

    But rather with UAC enabled, the compromise runs under the context of
    the admin's Standard user token, because admin user on Vista is returned
    to using that token upon privileged escalation completion, and it's a
    limit rights token, which mitigates/limits damage.

    Like I said, nothing is bulletproof not even god's O/S Linux, but UAC on
    the MS platform is better than have nothing at all, which is the case in
    fact with the previous versions of the NT based O/S platform, open by
    default O/S(s), to help protect the O/S.
     
  12. DanS wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Jack the Ripper <Jack@Rripper.com> wrote in news:ejlXzxHkJHA.4028
    > @TK2MSFTNGP03.phx.gbl:
    > <!--coloro:green--><span style="color:green <!--/coloro-->
    >> DanS wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Justin <Justin@nobecauseihatespam> wrote in
    >>> news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl:
    >>>
    >>> (Top-posted for brevity.....)
    >>>
    >>> Don't you just love it how some people, when they hear you don't like
    >>> something, it's because you don't understand it or how to use it or too
    >>> stupid to understand it.<!--colorc--><!--/colorc-->
    >> Which is usually the case.<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> How come, I know what it does, I know how it works, I don't like it is
    >>> never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->
    >> This is your pov, which is not good enough.<!--colorc--><!--/colorc-->
    >
    > Not good enough for ???????<!--colorc--><!--/colorc-->

    You are boring.
     
  13. Not Even Me

    Not Even Me Guest

    I run scans weekly and don't find myself infected.
    Malwarebytes, Spybot Search & Destroy, Spyware Doctor, Superantispyware, and
    rootkit unhooker all report no infections.
    Even Trend Micro's RUBotted shows clean.
    I repair computers and I have seen machines with hundreds of spyware
    programs, virus, root kits, bots, you name it.
    But I clean them all up or format/reinstall as necessary.
    It's amazing what you can find on a machine (and successfully remove) when
    you boot from a CD and scan without allowing the OS to be active.

    "Jack the Ripper" <Jack@Rripper.com> wrote in message
    news:uvizVRCkJHA.5732@TK2MSFTNGP05.phx.gbl...<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Not Even Me wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> I understand how and why, I just don't like the constant nagging.
    >> If I wanted a Nanny, I would have hired one, not had one snuck in the
    >> back door with a new OS.
    >> Turning it off completely mucks up some other things, so I shut down as
    >> many of the nags as possible.
    >> The problem is, with the constant nagging, you become accustomed to just
    >> clicking through to get the retarded thing off the screen.
    >> I don't really care what happens as long as I don't have to see that
    >> stupid prompt ever again!
    >> That is just one of many reasons Vista will never be on my LAN.
    >> BTW: I enabled the hidden admin account in Vista and use it every day.
    >> I haven't been infected yet.
    >> But I've only used it since early Beta...<!--colorc--><!--/colorc-->
    >
    > Or you don't know that you have been infected nor do you know how to go
    > look from time to time to see if the machine has been compromised as the
    > compromise sits there right in your face or it hides itself.
    >
    > What? I don't get many UAC prompts to even be concerned about it. And if I
    > do get a unexpected prompt, then I will know that something dubious might
    > be happening. <!--colorc--><!--/colorc-->
     
  14. Not Even Me

    Not Even Me Guest

    "Jack the Ripper" <Jack@Rripper.com> wrote in message
    news:ejlXzxHkJHA.4028@TK2MSFTNGP03.phx.gbl...<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > DanS wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin <Justin@nobecauseihatespam> wrote in
    >> news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl: (Top-posted for brevity.....)
    >>
    >> Don't you just love it how some people, when they hear you don't like
    >> something, it's because you don't understand it or how to use it or too
    >> stupid to understand it.<!--colorc--><!--/colorc-->
    >
    > Which is usually the case.<!--coloro:green--><span style="color:green <!--/coloro-->
    >>
    >> How come, I know what it does, I know how it works, I don't like it is
    >> never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->
    >
    > This is your pov, which is not good enough.<!--colorc--><!--/colorc-->

    And just what makes your POV superior or more important?
     
  15. Not Even Me

    Not Even Me Guest

    "Jack the Ripper" <Jack@Rripper.com> wrote in message
    news:eUh6F1LkJHA.4760@TK2MSFTNGP04.phx.gbl...<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > Justin wrote:<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Jack the Ripper wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Justin wrote:
    >>>> Jack the Ripper wrote:
    >>>>> +Bob+ wrote:
    >>>>>> On Sun, 15 Feb 2009 15:43:31 -0500, Jack the Ripper
    >>>>>> <Jack@Rripper.com>
    >>>>>> wrote:
    >>>>>>
    >>>>>>> Nothing is bulletproof, but one doesn't see a lot of posts by Vista
    >>>>>>> users about virus or malware issues, not like you see on XP.
    >>>>>>
    >>>>>> No, but you do see a lot of posts about how UAC sucks. Good idea, bad
    >>>>>> implementation.
    >>>>>>
    >>>>>
    >>>>> It's the posts of the ignorant. I would rather have it enabled so that
    >>>>> I am not on the Internet with full admin rights, like the previous
    >>>>> versions of the NT based O/S(s,) which are open by default O/S(s) and
    >>>>> wide-open to attack/compromise by default.
    >>>>>
    >>>>> Is that so hard for you or anyone else to understand?
    >>>>
    >>>>
    >>>> As long as you're not logged on as admin you should be fine. At most I
    >>>> keep users at Power User rights.
    >>>> While I understand running as admin is unsafe, simply having the
    >>>> account enabled is not a security risk.
    >>>
    >>> I am going to try to explain this again. The out of the box admin
    >>> account on Vista that is given to a user or any subsequent admin account
    >>> that is created on Vista with UAC enabled is NOT a full-rights-admin
    >>> account. It's only a Standard user account, which must be escalated to a
    >>> use the full-adminrights token to do anything requiring
    >>> admin-full-rights as an administrator.<!--colorc--><!--/colorc-->
    >>
    >>
    >> I get it.
    >> I don't need any escalation to admin. The problem is, what if there's
    >> some malware. Some malware named "winenhancer." The user sees the UAC
    >> prompt "Winenhancer must access the internet!" and the user clicks on
    >> yes.
    >> So UAC only works when the user knows everything about the PC, which is
    >> unrealistic for a standard dumb user whose job is to type out proposals
    >> and reports.<!--colorc--><!--/colorc-->
    >
    > Oh, I get it. It's not the responsibility of the dumb user to know what he
    > or she is dumbly clicking on as they point and click. It's their
    > responsibly to know the situation, but they don't and most never will.
    >
    > However, network admins take that responsibly for this type of worker by
    > using a network proxy that only allows the users to go to approved sites
    > closing the attack vector and mitigating such damage, as its their
    > responsibility to protect company's interest and not some office clerk,
    > lock them down.
    >
    > Just like with Linux which has the same kind of an approval process within
    > its O/S, they point, click, approve and it's all bets are off. But with
    > UAC enabled when one does this, the damages are mitigated to a certain
    > degree as UAC protects critical areas and also not allowing the malware to
    > continuously run under the context of the user-admin full-rights access
    > token, to spread damage.
    >
    > But rather with UAC enabled, the compromise runs under the context of the
    > admin's Standard user token, because admin user on Vista is returned to
    > using that token upon privileged escalation completion, and it's a limit
    > rights token, which mitigates/limits damage.
    >
    > Like I said, nothing is bulletproof not even god's O/S Linux, but UAC on
    > the MS platform is better than have nothing at all, which is the case in
    > fact with the previous versions of the NT based O/S platform, open by
    > default O/S(s), to help protect the O/S.<!--colorc--><!--/colorc-->

    Real time scanning by (even free) third party programs provides (in many
    cases) superior protection with less annoyance.
    So why put something in the OS that just pisses many people off and is (by
    MS admission) made irritating on purpose?
     
  16. Saucy

    Saucy Guest

    "Not Even Me" <cargod01@hotmail.com> wrote in message
    news:uNylAgOkJHA.5732@TK2MSFTNGP05.phx.gbl...<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > "Jack the Ripper" <Jack@Rripper.com> wrote in message
    > news:eUh6F1LkJHA.4760@TK2MSFTNGP04.phx.gbl...<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Jack the Ripper wrote:
    >>>> Justin wrote:
    >>>>> Jack the Ripper wrote:
    >>>>>> +Bob+ wrote:
    >>>>>>> On Sun, 15 Feb 2009 15:43:31 -0500, Jack the Ripper
    >>>>>>> <Jack@Rripper.com>
    >>>>>>> wrote:
    >>>>>>>
    >>>>>>>> Nothing is bulletproof, but one doesn't see a lot of posts by Vista
    >>>>>>>> users about virus or malware issues, not like you see on XP.
    >>>>>>>
    >>>>>>> No, but you do see a lot of posts about how UAC sucks. Good idea,
    >>>>>>> bad
    >>>>>>> implementation.
    >>>>>>>
    >>>>>>
    >>>>>> It's the posts of the ignorant. I would rather have it enabled so
    >>>>>> that I am not on the Internet with full admin rights, like the
    >>>>>> previous versions of the NT based O/S(s,) which are open by default
    >>>>>> O/S(s) and wide-open to attack/compromise by default.
    >>>>>>
    >>>>>> Is that so hard for you or anyone else to understand?
    >>>>>
    >>>>>
    >>>>> As long as you're not logged on as admin you should be fine. At most
    >>>>> I keep users at Power User rights.
    >>>>> While I understand running as admin is unsafe, simply having the
    >>>>> account enabled is not a security risk.
    >>>>
    >>>> I am going to try to explain this again. The out of the box admin
    >>>> account on Vista that is given to a user or any subsequent admin
    >>>> account that is created on Vista with UAC enabled is NOT a
    >>>> full-rights-admin account. It's only a Standard user account, which
    >>>> must be escalated to a use the full-adminrights token to do anything
    >>>> requiring admin-full-rights as an administrator.
    >>>
    >>>
    >>> I get it.
    >>> I don't need any escalation to admin. The problem is, what if there's
    >>> some malware. Some malware named "winenhancer." The user sees the UAC
    >>> prompt "Winenhancer must access the internet!" and the user clicks on
    >>> yes.
    >>> So UAC only works when the user knows everything about the PC, which is
    >>> unrealistic for a standard dumb user whose job is to type out proposals
    >>> and reports.<!--colorc--><!--/colorc-->
    >>
    >> Oh, I get it. It's not the responsibility of the dumb user to know what
    >> he or she is dumbly clicking on as they point and click. It's their
    >> responsibly to know the situation, but they don't and most never will.
    >>
    >> However, network admins take that responsibly for this type of worker by
    >> using a network proxy that only allows the users to go to approved sites
    >> closing the attack vector and mitigating such damage, as its their
    >> responsibility to protect company's interest and not some office clerk,
    >> lock them down.
    >>
    >> Just like with Linux which has the same kind of an approval process
    >> within its O/S, they point, click, approve and it's all bets are off. But
    >> with UAC enabled when one does this, the damages are mitigated to a
    >> certain degree as UAC protects critical areas and also not allowing the
    >> malware to continuously run under the context of the user-admin
    >> full-rights access token, to spread damage.
    >>
    >> But rather with UAC enabled, the compromise runs under the context of
    >> the admin's Standard user token, because admin user on Vista is returned
    >> to using that token upon privileged escalation completion, and it's a
    >> limit rights token, which mitigates/limits damage.
    >>
    >> Like I said, nothing is bulletproof not even god's O/S Linux, but UAC on
    >> the MS platform is better than have nothing at all, which is the case in
    >> fact with the previous versions of the NT based O/S platform, open by
    >> default O/S(s), to help protect the O/S.<!--colorc--><!--/colorc-->
    >
    > Real time scanning by (even free) third party programs provides (in many
    > cases) superior protection with less annoyance.
    > So why put something in the OS that just pisses many people off and is (by
    > MS admission) made irritating on purpose?
    ><!--colorc--><!--/colorc-->


    Didn't he just explain it to you? Re-read his post:

    "But rather with UAC enabled, the compromise runs under the context of the
    admin's Standard user token, because admin user on Vista is returned to
    using that token upon privileged escalation completion, and it's a limit
    rights token, which mitigates/limits damage."

    Combining secutity features such as UAC and real time scanning makes systems
    more difficult to compromise both directly and indirectly [say, by social
    engineering].

    Saucy
     
  17. DanS

    DanS Guest

    "Not Even Me" <cargod01@hotmail.com> wrote in
    news:OeencdOkJHA.4448@TK2MSFTNGP05.phx.gbl:
    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    >
    > "Jack the Ripper" <Jack@Rripper.com> wrote in message
    > news:ejlXzxHkJHA.4028@TK2MSFTNGP03.phx.gbl...<!--coloro:green--><span style="color:green <!--/coloro-->
    >> DanS wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Justin <Justin@nobecauseihatespam> wrote in
    >>> news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl: (Top-posted for
    >>> brevity.....)
    >>>
    >>> Don't you just love it how some people, when they hear you don't
    >>> like something, it's because you don't understand it or how to use
    >>> it or too stupid to understand it.<!--colorc--><!--/colorc-->
    >>
    >> Which is usually the case.<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>>
    >>> How come, I know what it does, I know how it works, I don't like it
    >>> is never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->
    >>
    >> This is your pov, which is not good enough.<!--colorc--><!--/colorc-->
    >
    > And just what makes your POV superior or more important? <!--colorc--><!--/colorc-->

    It wasn't even a POV or opinon, but an observation.
     
  18. Not Even Me wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > I run scans weekly and don't find myself infected.
    > Malwarebytes, Spybot Search & Destroy, Spyware Doctor, Superantispyware, and
    > rootkit unhooker all report no infections.
    > Even Trend Micro's RUBotted shows clean.
    > I repair computers and I have seen machines with hundreds of spyware
    > programs, virus, root kits, bots, you name it.
    > But I clean them all up or format/reinstall as necessary.
    > It's amazing what you can find on a machine (and successfully remove) when
    > you boot from a CD and scan without allowing the OS to be active.<!--colorc--><!--/colorc-->

    I don't care if you run scans weekly are not as the compromise can fool
    the detection software and hide itself, just like it can fool the O/S.
    And what about zero day exploits where there is no detection signature
    published for the detection solution at the time of the compromise?

    You clean a machine that has hundreds of infections and compromises when
    the only safe course of action is flatten the HD?

     
  19. Not Even Me wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > "Jack the Ripper" <Jack@Rripper.com> wrote in message
    > news:ejlXzxHkJHA.4028@TK2MSFTNGP03.phx.gbl...<!--coloro:green--><span style="color:green <!--/coloro-->
    >> DanS wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Justin <Justin@nobecauseihatespam> wrote in
    >>> news:upSuRh9jJHA.4760@TK2MSFTNGP04.phx.gbl: (Top-posted for brevity.....)
    >>>
    >>> Don't you just love it how some people, when they hear you don't like
    >>> something, it's because you don't understand it or how to use it or too
    >>> stupid to understand it.<!--colorc--><!--/colorc-->
    >> Which is usually the case.<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> How come, I know what it does, I know how it works, I don't like it is
    >>> never good enough for some people. (rhetorical)<!--colorc--><!--/colorc-->
    >> This is your pov, which is not good enough.<!--colorc--><!--/colorc-->
    >
    > And just what makes your POV superior or more important?
    >
    > <!--colorc--><!--/colorc-->

    What makes you think that your pov is superior, important or the course
    of actions you have posted about anything you have done here that you
    have to me is significant and I should respect your pov?

    What you have doing now and what you have done in the past as I have
    encountered you is give me a lot of lip service.
     
  20. Not Even Me wrote:<!--coloro:blue--><span style="color:blue <!--/coloro-->
    > "Jack the Ripper" <Jack@Rripper.com> wrote in message
    > news:eUh6F1LkJHA.4760@TK2MSFTNGP04.phx.gbl...<!--coloro:green--><span style="color:green <!--/coloro-->
    >> Justin wrote:<!--coloro:darkred--><span style="color:darkred <!--/coloro-->
    >>> Jack the Ripper wrote:
    >>>> Justin wrote:
    >>>>> Jack the Ripper wrote:
    >>>>>> +Bob+ wrote:
    >>>>>>> On Sun, 15 Feb 2009 15:43:31 -0500, Jack the Ripper
    >>>>>>> <Jack@Rripper.com>
    >>>>>>> wrote:
    >>>>>>>
    >>>>>>>> Nothing is bulletproof, but one doesn't see a lot of posts by Vista
    >>>>>>>> users about virus or malware issues, not like you see on XP.
    >>>>>>> No, but you do see a lot of posts about how UAC sucks. Good idea, bad
    >>>>>>> implementation.
    >>>>>>>
    >>>>>> It's the posts of the ignorant. I would rather have it enabled so that
    >>>>>> I am not on the Internet with full admin rights, like the previous
    >>>>>> versions of the NT based O/S(s,) which are open by default O/S(s) and
    >>>>>> wide-open to attack/compromise by default.
    >>>>>>
    >>>>>> Is that so hard for you or anyone else to understand?
    >>>>>
    >>>>> As long as you're not logged on as admin you should be fine. At most I
    >>>>> keep users at Power User rights.
    >>>>> While I understand running as admin is unsafe, simply having the
    >>>>> account enabled is not a security risk.
    >>>> I am going to try to explain this again. The out of the box admin
    >>>> account on Vista that is given to a user or any subsequent admin account
    >>>> that is created on Vista with UAC enabled is NOT a full-rights-admin
    >>>> account. It's only a Standard user account, which must be escalated to a
    >>>> use the full-adminrights token to do anything requiring
    >>>> admin-full-rights as an administrator.
    >>>
    >>> I get it.
    >>> I don't need any escalation to admin. The problem is, what if there's
    >>> some malware. Some malware named "winenhancer." The user sees the UAC
    >>> prompt "Winenhancer must access the internet!" and the user clicks on
    >>> yes.
    >>> So UAC only works when the user knows everything about the PC, which is
    >>> unrealistic for a standard dumb user whose job is to type out proposals
    >>> and reports.<!--colorc--><!--/colorc-->
    >> Oh, I get it. It's not the responsibility of the dumb user to know what he
    >> or she is dumbly clicking on as they point and click. It's their
    >> responsibly to know the situation, but they don't and most never will.
    >>
    >> However, network admins take that responsibly for this type of worker by
    >> using a network proxy that only allows the users to go to approved sites
    >> closing the attack vector and mitigating such damage, as its their
    >> responsibility to protect company's interest and not some office clerk,
    >> lock them down.
    >>
    >> Just like with Linux which has the same kind of an approval process within
    >> its O/S, they point, click, approve and it's all bets are off. But with
    >> UAC enabled when one does this, the damages are mitigated to a certain
    >> degree as UAC protects critical areas and also not allowing the malware to
    >> continuously run under the context of the user-admin full-rights access
    >> token, to spread damage.
    >>
    >> But rather with UAC enabled, the compromise runs under the context of the
    >> admin's Standard user token, because admin user on Vista is returned to
    >> using that token upon privileged escalation completion, and it's a limit
    >> rights token, which mitigates/limits damage.
    >>
    >> Like I said, nothing is bulletproof not even god's O/S Linux, but UAC on
    >> the MS platform is better than have nothing at all, which is the case in
    >> fact with the previous versions of the NT based O/S platform, open by
    >> default O/S(s), to help protect the O/S.<!--colorc--><!--/colorc-->
    >
    > Real time scanning by (even free) third party programs provides (in many
    > cases) superior protection with less annoyance.<!--colorc--><!--/colorc-->

    BS, as it's just a program that can be fooled like any other program's
    job that is to detect.

    <!--coloro:blue--><span style="color:blue <!--/coloro-->
    > So why put something in the OS that just pisses many people off and is (by
    > MS admission) made irritating on purpose? <!--colorc--><!--/colorc-->

    Why put something in the O/S? Why put something in the O/S? It's because
    the buck stops at the O/S, and it stops nowhere else but the O/S.
     

Share This Page