if you elevate the privileges, all security changes are gone. just hope britney isn't something evil..
virtualisation is overrated and only useful for non-secured systems mainly. vista, and so win2008, are technically very similar to virtualized systems.
vista allows whitelisting. it does allow all sort of security settings. but it doesn't change the fact that a vista with uac on in it's default installed configuration can nearly not get harmed, except if you agree on a UAC prompt.
and i don't agree that the whitelisting and all further increases security. it further limits what users can do. and maybe further secures the users data. but vista is secure independent on the app you run until you click yes on the uac prompt. anything else does not increase the security of the os (or the installed apps which are in the uac savety by default. steam is a well known counterexample who disables uac for itself).
-
davepermen Notebook Nobel Laureate
-
I am a little confused about UAC now, after reading through the last four pages.
So all UAC does it make sure that you give permission to whatever your computer is about to do?
If I am the lone user of my computer, do I need to enable UAC?
I do not have powerpoint installed on this computer yet davepermen, could you please give me a run down on Fixing UAC Bugs? -
-
-
Darth Bane Dark Lord of the Sith
This thread is too full of smug, "i-am-smarter-then-you" attitude.
-
davepermen Notebook Nobel Laureate
one thing about UAC: it may not be perfect, but it's, contrary to vire scanners, perfect in how it reacts in an inperfect case: a vire scanner does nothing if he doesn't detect the virus. UAC prompts while you don't even try to hurt the system.
so UAC is "too secure" when vire scanners are "too less".
but UAC normally only prompts when you access the system files. if not, learn how to change the behaviour. it's not hard (but actually file permissions are quite hard to grasp). -
-
davepermen Notebook Nobel Laureate
-
Darth Bane Dark Lord of the Sith
-
But when come to protection, it is ZERO resources.
Read this, http://www.javacoolsoftware.com/spywareblaster.html#Principles
UAC and non-UAC... What a pain... Better keep quiet.
Intelligence and Bashing topic???
sounds like magician versus warrior. -
davepermen Notebook Nobel Laureate
-
davepermen Notebook Nobel Laureate
i prefer to trust the vendor of my operating system, who makes billions over billions with it, and huge corporations trust it with the billions they have to have saved trough it, than some nice marketing guy who writes "it doesn't slow down".
they don't state _how_ it doesn't slow down. for UAC i know exactly HOW it doesn't slow down. it does only slow down at the moment of the prompt, as the moment, the os gets a "not sufficient rights" exception at some file access, instead of just canceling out and saying "can't do", it reacts with "try again with admin rights?".
that, sir, is by it's very logic, something that does NOT cost any system resources while not prompting. the other app doesn't explain that. maybe another link would help?
still, no matter how much links, it's still "just written on some webpage", which doesn't make it right, or true (they can believe in it, but they may have failed to implement it in a 100% way, what ever they did).
i am btw a developer, does sometimes help to "see trough" invalid statements of software vendors. certain stuff isn't possible. realtime file protection with signatures and heuristics without overhead f.e. isn't. -
I think you don't obviously.
Because the Blocking stuffs is mixed/live-in to your internet browsers. Your browsers is now readily to block spywares.
The protection is passive not active. Thus, it just like UAC kind of stuffs that uses ZERO resources.
I have checked my services and processes list and there is no such thing as SpywareBlaster thingy in the list.
Which mean it doesn't use resources. -
davepermen Notebook Nobel Laureate
well, they don't state that on the page really. have read trough it. and even then, it may be bluff. for UAC, i know it. because i've used just what uac uses years ago for "fun" on xp. testing out how to secure a company with user rights management.
if the protection is passive, will it be EVERYWHERE where an app can harm the system? if so, it is uac, and you can just drop the app and use uac. if not, then it WILL not be perfect, so it's even less than uac. -
-
But it consume 0 resources as I told you.
I checked the services and processes list. NOTHING related to SPYWAREBLASTER can be found.
When browsing internet, if there is a pop-up, it would auto-block it.
Can be see clearly. The pop-up windows appear but blank(blocked).
I tried disabling the passive protection and ah-ha the pop-up windows appears with content and pictures.
Moreover, SPYWAREBLASTER is recommended by Baserk, http://forum.notebookreview.com/showthread.php?t=190538
PLEASE DON'T UNDERESTIMATED OTHER SOFTWARES UNLESS YOU CREATE A EXTREMELY STRONG AND POWERFUL 1! I DO NOT UNDERESTIMATE UAC AS WELL. PLEASE RESPECT! -
davepermen Notebook Nobel Laureate
first: i don't have powerpoint right now on my laptop myself haha.. sorry good spliff.
second: there is a powerpoint viewer, free to download from microsoft. it's a quite small download.
third:
uac is, simply said, about that:
you're by default never the admin, but an ordinary user. the ordinary user has no write access to c:\program files, c:\windows and some other system relevant folders.
while you run around your system, you may hit some stuff you do that affects the whole system (like, a tweaking example, changing the boot logo, or installing an app).
at this moment, the user will get hit by the file/process/etc permissions to not be allowed to do that.
so far, nothing changed since nt/2000/xp when you run a normal user accound. but NOW, once the permissions hit in and say "no, user, you're not allowed to do that", the os switches into a secure mode. it's a second desktop which disables everything except keyboard and mouse, so no one can act on that except you, as a user, in front of the system.
and there it asks, are you sure, do you want to get more power, to do that systemwide change that may harm your system. or in short: continue/cancel.
this change to secure desktop, and asking if you may want to do it anyways is systemwide, as its just part of the system wide rights management, aka user permisssions.
and once you said "continue", you leave that secure desktop, and get the app restarted with admin rights.
so what you get out of this?
all your apps run without admin rights => nothing can harm your system. (it still may harm your own files like music/pics/etc as it runs with your rights).
the moment running an app without admin rights is not enough, it asks you and only you to grant the right, for that specific app.
that's UAC. only the tiny bit after "you don't have enough rights" is uac. the asking if you want more rights, then. any os pre vista didn't ask, but just failed. so it's the first os that makes it for the ordinary user usable, to not be admin all day long.
the gain: any virus that sneakes in any way into your system first has to get admin rights to harm the system. to get that, it HAS to go to the uac prompt and ask you. -
davepermen Notebook Nobel Laureate
and even if it just attaches itself to existing software, it doesn't mean it doesn't need resources. because SCANNING FOR MALWARE OF ANY FORM NEEDS RESOURCES. and only uac doesn't scan an exe at all, it just doesn't run them without your acceptance. that's what makes it "dump", but "always working", and "non-resource-eating".
plain logic, sir.
and i do respect you, no problem. it's just some logic that you maybe fails to see. anything that has to analyze data needs resources. any form of scanner, how ever passive, needs to analyze the data => it eats resources. it has to access it's database from disk, or loads it into memory. so it's a disk hog slowing down with diskaccesses, or a memory hog. but it needs its database. or it's heuristic, then it needs computationtime to analyze the data.
eigher way, it's not "free". uac is. file permissions of ntfs aren't free btw. but uac in an ntfs land is free. -
Darth Bane Dark Lord of the Sith
-
Technically if you wanted you could take the higher Admin account to make yours a normal user account -
-
I am still very confused. davepermen, I read your entire UAC thread from your sig and I still don't quite comprehend what I should do.
I am the lone user of a 64bit Vista Home Premium Dell Studio XPS 1640 laptop. I currently have Norton Anti-Virus and Windows Defender running.
My question to you is, "Is it necessary for me to have UAC enabled?"
If so, must I deal with the constant prompts or is there a way to safely edit the settings where I am still safe?
A simple breakdown is appreciated. I am little tech-n00b so if you could explain to me as if I was 10 please. -
It is highly recommended to leave UAC turned on to keep your operating system protected. -
-
If say a malicious programme were to launch - requiring Admin rights/permissions the UAC window should and would just pop up - as you haven't started the application you should then abort it.
About applications not being able to select it - Dave told me it opens a second "special screen" - but I think he can tell you more about it. -
Christoph.krn Notebook Evangelist
Should be impossible to get a perfect solution.
But then again, if brain patching was possible, there would be more possibilities and problems to think about.
In short, if any application gets data from outside (like a webbrowser, for example, or even a document reader) and does not verify that data thoroughly, the data may get executed although it shouldn't.
At least there still aren't as many "professional" (not to be understood technical, but malicious-software-benefit-wise) viruses for OS X that aim at kidnapping or stealing your data or your money, making OS X more secure than Windows - at the moment! You may be interested in: http://www.h-online.com/security/Ex...o-increase-its-security-efforts--/news/113489 (Despite the "Expert says" in the headline: that's a pretty reliable source for information).
It was already very much when Microsoft just said they'd do it...
It had multiple names, actually. "Palladium" was the Microsoft part, which is now called NGSCB (Next-Generation Secure Computing Base). For now, good thing that BitLocker is the only that's left of that in Vista. Though with TPMs being built into many computers already, I think Microsoft could actually be planning to implement this "from below"...
I wish I wouldn't sound like this. Sorry.
There are still too many applications out there in the wild that ask for more privileges than needed.
- Administrator
- Administrator in Admin approval mode (This is what the default account is)
- Standard User
Administrators in Admin approval mode only have the rights of Standard users unless they need higher rights. When higher rights are needed, they have to be explicitly granted by the user - a UAC dialog will appear.
Do you wish further information on credential prompts?
You may want to read the beginning of "UAC's Goal" on http://technet.microsoft.com/de-de/magazine/2007.06.uac(en-us).aspx, but it's getting a bit techy pretty soon after that part.
Some kind of collaborative, comprehensive document about all this is needed. -
Boy, and I thought I was long-winded! Looks like I've got competition for the crown.
-
Christoph.krn Notebook Evangelist
You have a crown for long-windedness? I wonder what it looks like! I guess it's very... long!
-
the view just goes on forever, and they put a sparkly little ornament at the tip of the hood so you can get a good estimate on where the nose ends!Last edited by a moderator: Feb 6, 2015 -
Ok. So how do I edit UAC so it is more user friendly? I have windows vista home premium 64bit. Do I have to just deal with the prompts or is there a way to stay safe with less prompts?
-
Quite honestly, though, I've been running on _Vista Home Premium 64-bit - standard OEM installation with no tweaks - have installed and uninstalled some stuff, and really haven't found the UAC prompts to be much of a problem to deal with. So far I've not had one pop up when I didn't expect it to (which would happen if something was trying to covertly install itself), and clicking through it when it pops up when I do expect it to (e.g., I just ran an installer for something) is not that big of an imposition on my time. -
Win 7 FTW -
-
-
Christoph.krn Notebook Evangelist
The highest setting in Windows 7 is what's default in Vista. The default setting of Windows 7 is the same as the highest one, except for the fact that there's a whitelist of things that are allowed to elevate privileges automatically. The problem: malicious software can start one of the whitelisted applications (which will then automatically start elevated without any prompt or notice appearing at all) and use DLL injection to tell that application whatever it wants it to do. This way, the malicious software will gain administrative rights without a UAC dialog appearing. If UAC is set to the highest setting in Windows 7, this will not work without displaying UAC dialogs. In Vista, this will not work without displaying UAC dialogs. -
If a file is written by another user or by an Account with UAC off, turning UAC on may result in a command prompt.
I had that - I was originally running without UAC - nowadays its with...
I had to take ownership of my external HDDs I believe... -
davepermen Notebook Nobel Laureate
but non-the-less. not everything i said about UAC is true. UAC is sort of hackable. i've added a link from mark russinovich, ultimate guru of microsoft, at my sign. he explains every detail. -
davepermen Notebook Nobel Laureate
-
davepermen Notebook Nobel Laureate
but full detail in my link to mark russinovich (and after posting this some times, i can actually spell the name)
-
davepermen Notebook Nobel Laureate
Windows 7 UAC Code Injection Vulnerability Video Demonstration Source Code Released/
that little video shows why i don't like the new win7 version of uac. because it fails. -
Christoph.krn Notebook Evangelist
So far, it is unlikely that this will be improved before Windows 7 final, and also unlikely after its release.
I will refrain from posting any additional information here, as that may collide with the forum rules.
-
Christoph.krn Notebook Evangelist
If you set UAC to "Always Notify" (highest setting) in the Control Panel of Windows 7, it is as safe as it is in Vista. -
davepermen Notebook Nobel Laureate
it's called 'server'.
reason: i manage 3 homeservers. one at my parents home, one at mine, one at the club. all are called the same, so all links to \\server, all rdp settings, all other shortcuts work without a problem.
but i plan on printing a sticker "RÄV" with a foxy logo on it(in IKEA font
).
the link works for me, just retested. and yes, its the one you posted.
i'm so tempted in abusing the knowledge on how the uac of win7 fails to do some funky harmbut i don't want it to happen. win7 looks like it is the best thing that happens for microsoft. now a big worm that can only spread on win7 but not vista would not be really good for its reputation. and they deserve good reputation after what they got for vista, while delivering something great.
so, once some worm kills all win7 installations but no vista installations, i will with one part of me laught "I KNEW IT", but on the other hand be very sad for microsoft. and help out all the ones in trouble, of course.. -
davepermen Notebook Nobel Laureate
wait for win7 sp2, which will enhance the security then again, just like in xp dayswatch it raise the default settings of uac
-
Christoph.krn Notebook Evangelist
I was talking about the technical implementation of UAC itself. While UAC in Windows 7 is Broken By Default (TM) (), luckily it's at least still possible to get it into a state that is as secure as it is on Vista.
"To do some funky harm"? Please tell me you're not serious... -
davepermen Notebook Nobel Laureate
of course i'm not serious
(have to state that in public even if it would be a lie, not?)
no, seriously. it does give a bit of the "i'd like to hit them, just to show them how dump their action was" feeling. but i wouldn't do it. not that i'm really capable of that kind of thing, too lowlevel for me to do by myself. but the proof of concept works without issues, and that itself should be scary enough -
Christoph.krn Notebook Evangelist
You don't seem to want them to be, though.
Just In case you're implying I'd not state such things just to keep it secret, I have to say that that is not true.
I won't support or perform illegal actions. -
davepermen Notebook Nobel Laureate
obviously i have no illegal or evil plans at all. but the thoughts are there, not active, but simple "what if i would be evil" thoughts. and it's good to have them, to know what could happen from someone else who is evil. so i'm prepared for the fact that the chances are VERY high that win7 gets such an attack before christmas for biggest hurt. the stuff is documented and working right now, and i guess the evil hacker community is just waiting for the moment it'll hurt the most.
i hope it to not happen. i prefer to see hackers go against iphones, they deserve it much more
if i would write such a thing, i would write it so that it turns UAC back up to the max, and spread as much as possible. i would, if at all, write "good" virii. not that i even would do that, though.. but if at all..
and yes, really, if at all, i would do good 'harm'... -
). As far as I'm concerned, solid, basic security starts and ends with the brain that clicks the buttons. If the brain is a security risk, then almost no amount of "nannying" via UAC or anything else is going to provide complete security.
-
davepermen Notebook Nobel Laureate
that's why i teach the brains what it is and what it means. but then, uac is better than silent installing without any visible window of stuff you don't want, or deleting/overwriting system files that are of importance without noticing.
not?
MZ Vista Force (Tweaking Guide)
Discussion in 'Windows OS and Software' started by MaXimus, Jun 1, 2009.