Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Windows

Windows 7 To Dial Down UAC 390

Barence writes "Engineers working on Windows 7 have admitted Vista's User Account Control was too intrusive, and are promising to tone it down in the forthcoming Windows 7. 'We've heard loud and clear that you are frustrated,' says Microsoft engineer Ben Fathi. 'You find the prompts too frequent, annoying, and confusing. We still want to provide you control over what changes can happen to your system, but we want to provide you a better overall experience.' According to Fathi, when Vista first launched, 775,312 unique applications were producing prompts — so some may be annoyed that it won't be scrapped entirely, but at least Microsoft is listening. The comments echo those of Steve Ballmer, who admitted at a conference in London that 'the biggest trade-off we made was sacrificing security for compatibility. I'm not sure the end-users really appreciated that trade-off.'"
This discussion has been archived. No new comments can be posted.

Windows 7 To Dial Down UAC

Comments Filter:
  • by Ethanol-fueled ( 1125189 ) * on Friday October 10, 2008 @02:40PM (#25330723) Homepage Journal
    Of course most users are going to just click "OK", but how can the more tech-savvy users(you know, the ones who actually read the boxes) actually know what they're approving when the dialog boxes say such laughingly vague shit [wikimedia.org] like "File operation - continue or cancel?"!
    • by MobyDisk ( 75490 ) on Friday October 10, 2008 @02:45PM (#25330811) Homepage

      If only there was some sort of button, or perhaps a downward facing arrow, that would provide additional details about what is happening. That would be awesome.

      • by Anonymous Coward on Friday October 10, 2008 @02:53PM (#25330931)

        The details only tell you what application is requesting access.

        It most certainly does not tell you:

        What file - well, that's not completely true, it gives you the file name but not the path!
        What the file operation is (read? append? replace? delete?)
        Anything that might help you make your decision

        And when I said it tells you what application it is, I mean it tells you the process name, which is generally something very helpful like "RUNDLL32.EXE".

      • If only there was some sort of button, or perhaps a downward facing arrow, that would provide additional details about what is happening. That would be awesome.

        If only there was some sort of button, or perhaps a downward facing arrow, that would downgrade a Vista installation back to good old XP ...

      • by Miamicanes ( 730264 ) on Saturday October 11, 2008 @12:14AM (#25336451)

        I've said it before, and I'll say it again in the hope that someone from Microsoft might actually see this and have it sink in...

        If a program wants to create a new directory in c:\program files, that's not really a big deal.

        If a program wants to overwrite an existing non-executable file in an EXISTING directory of c:\program files, it's probably worth bothering me about.

        If a program wants to overwrite an existing executable file, dll, or device driver... or change a shortcut to point to a different file... THAT is a very, VERY big deal that merits my full attention.

        What Windows 7 REALLY needs is a way to run untrusted programs (untrusted by ME, not untrusted by Hollywood) in a chroot jail, complete with firewalled network access, spoofed system and registry settings, and parallel-universe copies of system files. Basically, a way to run apps that might be outright trojans in a way that limits the scope of their damage to their own subdirectory tree and phantom system files that are meaningful only to that app.

        Hell, Microsoft OWNS VirtualPC. DO SOMETHING with it. Give me an option that basically works something like, "Spawn a virgin installation of Windows... updated, but crap-free, with Explorer (the file manager) NOT spawned by default, and windows opening up in windows managed by the "real" hypervising-copy of Windows 7... then copy the installer to that instance's chroot jail, and launch it. Going forward, spawn the virtual instance of Windows, then launch the app in it." Think: the long-awaited sequel to WinOS/2... 15 years late, but better late than never ;-)

        The acid test: make it so someone can install a DRM'ed game that's a shameless rootkit (Starforce comes to mind...), emulating Windows well enough with phantom files (any files the program changes are local copies that apply only to the session that spawned them) and spoofed drivers so the Evil App never even realizes it's not screwing up the user's PC. Then be very, VERY anal about warning the user before anything is able to change a "global" (common to all instances of Windows spawned under the hypervisor) setting or file. Big hint... if you don't, Sun or VMware eventually WILL.

    • by SCPRedMage ( 838040 ) on Friday October 10, 2008 @02:48PM (#25330857)
      By the context it comes up in?

      Seriously. I run Vista, and I've NEVER seen a UAC prompt come up where I didn't know what it was for.

      And if you DON'T know what it is? Freaking hit cancel! What's the worst that'll happen? Something you're trying to do errors out? OH NOES!
      • Either it is turned off or you haven't installed anything that wanted to write to windows system directories.

        Try right clicking on computer, then selecting 'manage'. That should bring up UAC every time, unless it is turned off.

      • by hansamurai ( 907719 ) <hansamurai@gmail.com> on Friday October 10, 2008 @03:11PM (#25331149) Homepage Journal

        I use Ubuntu more than I've ever used Vista, but from both experiences, I see sudo/password requests when it makes sense and the UAC dialog when it makes sense.

    • by Thelasko ( 1196535 ) on Friday October 10, 2008 @02:52PM (#25330923) Journal
      I know most people hate it, but I actually thought UAC was Vista's most redeeming quality. I think it's a shame that Microsoft actually tried to make an OS that was secure by default only to have people immediately disable it.

      I think it would be better if Microsoft implemented something closer to sudo or su, but I think people would complain about that too.
      • by gad_zuki! ( 70830 ) on Friday October 10, 2008 @04:19PM (#25331953)

        >I think it would be better if Microsoft implemented something closer to sudo or su, but I think people would complain about that too.

        Its called runas and its been around since the first days of NT. When running as limited user you just right-click on an executable and select runas or you can use the command line.

        • Re: (Score:3, Informative)

          by lanner ( 107308 )

          Unfortunately, Runas is mostly crap. My IT Director thought this would be a great idea and forced all sysadmins to loose their special domain Administrator privileges and then make a privileged username_adm account for everyone. So, we have to use the _adm account to do anything with Administrator privileges. Some applications just don't work through Runas, it really screws up your environment, and using it just isn't easy. The solution is that most admins have ditched using their username accounts and

      • Re: (Score:3, Insightful)

        by sjames ( 1099 )

        MS is suffering from the decade of 'training' they provided to users and developers alike. They taught their users to not know enough to even understand why a UAC dialog might appear in the first place. They made people think you don't need to know a darned thing about computers to use one. SURPRISE! their users have no idea what this UAC thing is and don't know enough about computers to realise they need something like that.

        On the developer side, amongst other sins, they trained developers that they can ju

    • by macdaddy357 ( 582412 ) <macdaddy357@hotmail.com> on Friday October 10, 2008 @03:29PM (#25331385)
      A left mouse click was detected. Cancel or allow?
      Allow.
      A left mouse click was detected. Cancel or allow?
      Allow.
      A left mouse click was detected. Cancel or allow?
      Allow.
      A left mouse click was detected. Cancel or allow?
      Allow.
      and so on....
  • by mrbene ( 1380531 ) on Friday October 10, 2008 @02:41PM (#25330751)
    If you started this, or you trust this process, please click OK.
  • *DISABLE IT*. http://www.mydigitallife.info/2006/12/19/turn-off-or-disable-user-account-control-uac-in-windows-vista/ [mydigitallife.info]
    (Now, does that now make my Vista SP1 more 'Windows 7ish'?)

    Other methods here: http://www.google.com/search?hl=en&safe=off&q=How+to+disable+Vista+UAC [google.com]
    • Re: (Score:2, Informative)

      by Piranhaa ( 672441 )

      Please explain HOW that is the best solution. The point of it is to provide a protection that XP didn't have. I don't personally use Vista, but if I did I wouldn't think twice. If you just disable it, say bye bye to virus/malware protection other than whatever virus scanner you have.

      • Re: (Score:3, Informative)

        Only it really doesn't provide protection because it pops up so mind-numbingly often that the user is just going to click 'OK' after a while without thinking. It doesn't warn you because a program is bad, it's just warning that you're about to run a program. Better to have a good virus checker and a firewall that warns of attempt to connect the internet from your computer as well as from the outside. I have no need of UAC and have never had a problem of a rogue program or trojan taking over on either my Vis

        • by BlackSnake112 ( 912158 ) on Friday October 10, 2008 @03:31PM (#25331417)

          I have been forced to use vista (since beta) on my machine at work. UAC comes up:
          when you install software
          when you are getting to the management section (users, groups,etc)
          when you run regedit
          If you add new desktop to the wallpapers folder
          If you run a program that is accessing the 'protected' sections of the computer

          That is it for me. When you first get a computer, you set it up the way you want it. You ARE accessing the protected sections. UAC is doing what is was written to do. Once you are finished setting up the computer how often does UAC come up? It comes up for me now when I am remotely managing someone else's computer or I am putting some new software on. That is it. I have 5 people here that think they are using XP since I change the UI to classic. Which is really sad if you think about it. I had to tell the VP as he was complaining how vista sucked and XP on his desktop worked that his machine that we replaced 7 months ago was vista with the classic UI turned on. I think I might be looking for a new jobs soon.....

          • Re: (Score:3, Funny)

            Should have just told him its Mojave.
          • Re: (Score:3, Insightful)

            by LordLucless ( 582312 )
            Also: whenever you try and run a poorly-written program.

            The program is more a problem with all previous versions of Windows than with Vista. Previous versions lax security allowed developers to do stuff that should only have been allowed to happen under UAC. Because Microsoft allowed the lax security to continue on for so long, there are heaps of programs that assume access to things they shouldn't have, and don't really need.

            As other's have pointed out, sudo is a similar mechanism under Linux. The diff
      • by Zymergy ( 803632 ) *
        I am not saying I have the solution for what UAC was intended.
        UAC is preventative medicine whose side effects are worse than the actual symptoms.
        Most users simply click on the little boxes until the UAC goes away.
        I have had people call me to read the confusing UAC boxes and choices to me over the phone, asking me what to do. (Think Grandma and Mom and Aunts)

        I believe UAC is a failure because it does not address the need from the user's point of view. It tries to rubber-pad the world.
        The UAC shoul
    • Re: (Score:3, Insightful)

      by mweather ( 1089505 )
      If you're not installing Vista for enhanced security, why exactly are you installing it?
      • If you're not installing Vista for enhanced security, why exactly are you installing it?

        Because I'm buying or building a new computer other than a subnotebook. Between June 2008 and December 2096, Windows XP is not available on computers other than subnotebooks, and I want to use applications that work better under Windows Vista than under Ubuntu with Wine.

      • Because XP MCE is an abandoned child, and if you want specific functionality in Windows on a media center you need a windows box.

  • Dumb (Score:4, Insightful)

    by grub ( 11606 ) <slashdot@grub.net> on Friday October 10, 2008 @02:44PM (#25330797) Homepage Journal

    No, don't write secure software, staple on a bunch of dialog boxes to shift the onus onto the user.
    • Re: (Score:2, Insightful)

      by Rockoon ( 1252108 )
      You clearly don't know the issue. The issue is that its users want to run application that do things which might break securuty, and this goes to the clear advantages of backward compatability that its users want. The vista method is to allow programs to break security, but only after prompting the user beforehand.

      The widespread complaints about UAC is clear proof that backward compatability is of concern to its users because they are running programs which require it.
      • Re:Dumb (Score:5, Interesting)

        by haystor ( 102186 ) on Friday October 10, 2008 @02:58PM (#25330993)

        Does it really have to prompt me every single time? After prompting me to run the same program 5 times, couldn't it just ask me if I want to white list that program until the executable changes?

        • by Goaway ( 82658 )

          Apparently it was designed to be annoying in order to put pressure on developers to fix their apps.

          The result may not have been the intended one, but the motivation was fairly good.

      • Re: (Score:3, Insightful)

        The issue is that its users want to run application that do things which might break securuty, and this goes to the clear advantages of backward compatability that its users want.

        Last I checked, the NT line was supposedly a secure OS. Ie, the OS itself was in control and applications are always subordinate to the OS. What that means is, the OS is always in a position to maintain backward compatability when it comes to applications in a secure fashion.

        The vista method is to allow programs to break security

  • by BUL2294 ( 1081735 ) on Friday October 10, 2008 @02:45PM (#25330809)

    Seriously, why doesn't Microsoft spend its considerable resources helping fix UAC for Vista? Do it as part of SP2... Since answering UAC is modal (systemwide), it's not like any user-level apps "depend" on it behaving in a specific way/at specific times, so changing its behavior should have no negative effect on those apps...

    Or are they admitting defeat and preparing for the next battle (a.k.a. Windows 7)???

    • Re: (Score:3, Insightful)

      by snl2587 ( 1177409 )

      Seriously, why doesn't Microsoft spend its considerable resources helping fix UAC for Vista?

      At this point, why would they when they could just charge people to upgrade? So many people stuck with XP that fixing UAC in Vista wouldn't do anything for them.

      Or are they admitting defeat and preparing for the next battle (a.k.a. Windows 7)???

      Not in words, but in actions. I have a feeling that in the future this version of Windows is going to be referred to in much the same way as we refer to Windows Me now.

  • by Corpuscavernosa ( 996139 ) on Friday October 10, 2008 @02:47PM (#25330829)
    ...but I'm still running my beloved XP which they will have to pry from my cold, dead, outdated hard drive. Or, you know, unless Windows 7 is awesome.

    I couldn't be happier not having experienced the headaches mentioned in this article.

    • by Zymergy ( 803632 ) *
      Unless Windows 7 makes me feel as good as the transition was for me from Win98 to Win2k, I will be using WinXP for apps and games that I cannot use on my OSX Hackintosh partition.
      I will help pass out the coats in Hell when Apple decides to be price-competitive now that they all use the same chipset and processors (Intel) with the rest of the PC universe and also allow the free installation of their Intel OSX on standard PC hardware without hacked EFIs and BIOS's...
  • by MobyDisk ( 75490 ) on Friday October 10, 2008 @02:47PM (#25330839) Homepage

    In most Linux distros, if you do something that requires admin access, it asks you for the admin password and holds onto privileges for a little while. That way, if I rearrange a bunch of icons I don't get 100 different prompts. This is simply common sense. It amazes me that the Microsoft developers didn't get fed up with the prompts and do the obvious thing.

    • Start menu, type "Explorer", right-click Windows Explorer, select "Run as administrator", perform administrative tasks, close explorer window.

    • by LehiNephi ( 695428 ) on Friday October 10, 2008 @03:14PM (#25331181) Journal
      Yes, Linux does it right. The problem for Microsoft, however, is this: most programs written to run on Linux are written such that they can run without root-level privileges. Most programs written before the advent of Vista assumed that Administrator privileges were available by default.

      That assumption is no longer true. Since the number of programs is so enormous (the 775k mentioned in the summary), it's easier to deal with the privilege-escalation by putting in something like UAC than it is to fix every faulty application. Hopefully, developers have now learned to assume least privileges, so new programs won't require elevated privileges.

      I don't think anyone will agree that UAC was the best way to handle the situation, but it sure was the easy way out. As an earlier poster said, better sandboxing could handle the issue better, but it's obvious that the investment (money and potential schedule problems) wasn't worth it from MS's point of view.
    • How, exactly, is that a good thing? Your actions just 'hold onto privileges for a little while'? Are we actually aiming for security here?

    • Re: (Score:3, Informative)

      by Sancho ( 17056 ) *

      Awesome, so all malware needs to do is stay resident as the user's process until it detects that the user has elevated privileges. Then BLAMMO, sudo rootme.

      I'm not defending Vista, I'm just pointing out that it's not necessarily a good thing that the OS gives you this window. It's useful for interactive tasks, but not so great for processes that want to surreptitiously perform administrative actions--and let's face it, that's the larger problem.

      Just as an example, say I download and run an executable. It

      • Re: (Score:3, Interesting)

        by jcupitt65 ( 68879 )

        Awesome, so all malware needs to do is stay resident as the user's process until it detects that the user has elevated privileges. Then BLAMMO, sudo rootme.

        No, that one process gets a temporary elevation, not the user. It's not a security hole.

        Windows dev friends tell me that Windows actually has almost the same thing (you can have a timeout on admin privs), but sadly Explorer is too retarded to use it properly :-( Perhaps this is something win7 can address.

    • In most Linux distros, if you do something that requires admin access, it asks you for the admin password

      ...unless the user logged in already has those privileges, which in Vista is never.

      if I rearrange a bunch of icons I don't get 100 different prompts.

      You don't in Vista either. Maybe you can elaborate what you're doing exactly?

    • by Thelasko ( 1196535 ) on Friday October 10, 2008 @03:54PM (#25331673) Journal
      Really, the big problem is that Windows wasn't setup with security in mind in the first place. When Microsoft started to add security, they discovered that the developers were abusing administrator privileges. Sooner or later this was going to happen.

      Between using Windows and Linux, I've noticed that Windows is becoming more Linux/Unix like with every release. With XP the Documents and Settings folder really started to feel like /home. Unfortunately, the occasional program would still try to save user information in Program Files. Now when we make Program Files an administrator only area we have problems.

      The UAC issue is an issue that every company has when it does something wrong and tries to fix it. The users and developers get used to doing it the wrong way and it's very difficult to get them to do it right. Microsoft has to go through this pain if it wants to be a serious operating system.

      I've seen similar problems in manufacturing. When we try to bring a process under control, the operator at that station will resist and say, "but I've been doing it that way for 20 years!" Then we have to explain that they have been doing it wrong for 20 years. It's very difficult to change your way of doing this after that long. Some companies have tried, but weren't successful. [wikipedia.org] It's painful at the moment, but it will improve. Windows will become a better product because of it.
  • by Anita Coney ( 648748 ) on Friday October 10, 2008 @02:49PM (#25330861) Homepage

    ... how getting computer users to blindly click through continuous, repetitive, and annoying dialog boxes kept computers more secure in the first place. It would seem under any reasonable analysis to do the opposite.

    • It isn't about security.

      It's about blame.

      Well YOU were the one that clicked "okay" when the machine WARNED you that it MIGHT be dangerous. (Conveniently ignore the other thousand times when you were "warned" and it was not a threat.) Just a modern take on the old "boy who cried wolf" theme.

    • May have been BS but MS at one point said that UAC was designed to be annoying so that program devs would write more "secure" code. For example you don't need Admin level to run you little calendar program, but in XP most programs want to run with Admin
  • by Chemisor ( 97276 ) on Friday October 10, 2008 @02:50PM (#25330875)

    It would be a much better idea to force every programmer to run under a non-Administrator account (and no Administrators or even Power Users group membership either!) Anyone who complains is obviously writing bad code, since there is absolutely no friggin' reason that a regular application should require administrative privileges. Whatever you set during setup is IT! And, for God's sake, learn to open registry keys in read-only mode!

    • Re: (Score:3, Informative)

      by Volante3192 ( 953645 )

      Exactly. XP even has the structure for this. You have your OWN documents and settings folder (no need to put everything in program files) and you have your OWN registry hive with HKCU (no need to put everything in HKLM)

      Obviously you can read everywhere, but you can't write or modify, which is as it should be.

      But it just pisses me off every time I have to (re)install UPS worldship and it throws hissyfits til doomsday til i just give the account Local Admin...

    • by Gewalt ( 1200451 )

      The whole point of UAC was to shame the bad programmers into exactly this behavior. Unfortunately, MSFT has the grace of an ox and fell on their asses trying to shift blame.

    • Re: (Score:3, Interesting)

      by LWATCDR ( 28044 )

      But..
      And this is the big one. I agree for new code. But the only real strength of Windows is it's legacy of applications.
      It is supposed to run old software. And if you have ever supported average users let me explain why a good program could have problems.
      Lets say you have 10,000 users using your program under Windows 95. You store their files under Program Files, Program name, User
      Now more and more people buy your software and then XP hits. It recomends that you move those data files to My Documents. Well

      • Re: (Score:3, Informative)

        by Phroggy ( 441 )

        Actually they got this right. If you run apps designed for Win95, it creates a virtual directory tree inside the current user's home directory, so when the app tries to write to C:\Program Files, it really writes to this virtual filesystem and you don't get a UAC prompt at all.

        It's not Win95 apps that have a problem with UAC, it's WinXP apps.

      • Re: (Score:3, Interesting)

        by Chemisor ( 97276 )

        > Lets say you have 10,000 users using your program under Windows 95.
        > You store their files under Program Files, Program name, User

        In other words, you want to be inconsiderate and make me hunt down my data files under some weird directory name under Program Files, which, by the way, is hidden by default until you tell explorer to show system files or something. There is absolutely no excuse for writing data files in the program directory. Windows 95 supports home directories. Use them.

        > then XP hi

    • Re: (Score:3, Insightful)

      by wumpus188 ( 657540 )
      I agree... Except that on Vista, Visual Studio 2005 itself requires admin rights to be able debug anything or attach to any process for debugging. And VS2008? Forget about it.. At my place of work, we have VB6 projects that needs to be fixed and supported.
  • by IgnoramusMaximus ( 692000 ) on Friday October 10, 2008 @02:51PM (#25330909)

    This problem of imbecilic prompts is directly related to the entire inane history of DOS and then Windows, where all the lessons of multi-user systems learnt decades before were wilfully and sanctimoniously ignored by the resident Microsoft "geniuses". Thus application "developers" were allowed to, and soon came to depend on, access to what in nearly every other OS in existence are "root only" subsystems. Even in editions of Windows which were supposedly multi-user capable, the prevalent lazy practice of majority of "developers" was to depend on system-wide registry keys, administrative privilege level processes and what not to accomplish most mundane of tasks.

    And so now the chickens are home to roost, with literally hundreds of thousands of apps written to kindergarten competence levels. And Microsoft is in a bind: secure the OS and either break these stupidly written apps altogether, inundate the user with prompts every time one of them tries something stupid, or give up.

    They are scared to death of the implications of the first choice, tried the second, and now seem to be heading toward that last one.

  • Let me type su (Score:3, Interesting)

    by TibbonZero ( 571809 ) <Tibbon&gmail,com> on Friday October 10, 2008 @02:52PM (#25330917) Homepage Journal
    I know you could disable the UAC, but it wasn't as simple as typing 'su' and entering your root password.

    If I'm root I want to be able to do ANYTHING with no questions asked. Kill the filesystem with one commandline? Sure. Kill my databases? Sure. Change settings of anything? Sure.

    Yet the Administrator accounts in Windows get just as many annoying prompts (if not more) than the standard users. I should be able to configure rights below me easily to allow my standard user to not get bothered by prompts that they can just click through.
    br I see it as a huge issue because is faux security with the UAC mostly. It creates warnings basically, but doesn't prevent action (mostly again).
    • by Dan667 ( 564390 )
      Microsoft can only copy Linux so fast. Now if they could just copy the feature exactly without nerfing it or loosing sight of what is important for it to do.
  • by davidwr ( 791652 ) on Friday October 10, 2008 @03:03PM (#25331055) Homepage Journal

    Those who would give up Essential Security to purchase a little Temporary Liberty deserve Microsoft products.

  • by sam0737 ( 648914 ) <{sam} {at} {chowchi.com}> on Friday October 10, 2008 @03:08PM (#25331121)

    After the system, software is setup and running, I hardly run into any UAC prompt, except for one of the bank applications that for unknown requires admin privilege.

    If Vista didn't push for that, we will need admin privileges to run Windows, forever, because of the bad design of applications!

    There are, definitely, room for improvements, for example, combining the ActiveX Install prompt with UAC, reducing two to one. Combing the warning of running the Internet downloaded .exe and UAC, and allows a Explorer.exe to have the admin token for a while once granted, for those file manipulation operations.

    All in all, I love UAC! It's more convenient than typing "sudo ..." for every commands i need to run at root's right.

  • by Animats ( 122034 ) on Friday October 10, 2008 @03:11PM (#25331145) Homepage

    If Microsoft only allowed products to show any kind of Windows logo if they complied with the security rules, this wouldn't be a problem. Microsoft loosened up on the logo program because developers weren't willing to bother.

    This happened to Apple when they went to the PowerPC, and were dumped by many major software vendors. Apple wasn't in a position to order developers around, and they hadn't realized that. It took years to recover from that.

  • The biggest security problem in Windows is that the design of the HTML control and ActiveX in conjunction with the "security zone" model is inherently insecure. It provides a huge surface are to remote code execution exploits that simply does not exist in any other web browser... or any other software on any other platform that uses HTML and HTTP. The problem is that it's an explicit and deliberate mechanism for an object that should never be trusted... that is to say, a remote website... to request full local application permissions and run unsandboxed code.

    Until this model is changed and only explicitly installed applications can run outside the browser's sandbox, Windows is going to remain the poster boy for "insecure systems".

    Being able to prevent an already compromised application from performing system administration tasks is laudable, but it's not really all that important to the user. Everything on their computer that they care about isn't owned by the administrator, it's owned by their regular user account. And there's plenty of places owned by the end user that malware can hide to keep being restarted after the computer is rebooted. UAC is a partial sandbox, at best.

    Being able to restrict what the web browser can do after it;s been compromised is laudable, but since the browser has to be able to save files for the user, it can still inject an exploit into the users account. So the reduced privilege mode on Vista (and the much touted sandboxes on OS X) are leaky protection at best.

    And leaky sandboxes, and partial sandboxes, are more useful in providing a false sense of security to the user than actually keeping malware out.

    Getting rid of the "security zones" model and replacing it with hard impermeable sandboxes will cause some disruption. Programs like Windows Update will have to be rewritten to use plugins. ActiveX games will have to be rewritten as flash or modified to run in a full sandbox using something like .NET or a JVM. But this WOULD be a matter of trading off convenience for security. UAC is trading off convenience for the illusion of security. That's not the same thing at all.

  • "I'm not sure the end-users really appreciated that trade-off.'"

    I'm pretty sure Ballmer fails appreciate how little end users appreciate what he thinks they should. If Ballmer appreciated the fact that end users appreciate what they damn well want to in spite of the best efforts at mind control^H^H^H^H marketing hype ^H^H^H^H standardization, we might end up with a Windows that's not unpleasant to use.

    OK, I just reread that last line. I had no idea I was on drugs.

  • by heffrey ( 229704 ) on Friday October 10, 2008 @03:58PM (#25331725)

    I've recently upgraded at work from XP to Vista 64 and I really like it. I hate it when I go back to XP now - where's my search?!!! Start button, app title, , it's just ruddy marvellous.

    As a developer too UAC makes it much more realistic to develop and test under LUA scenarios.

    I don't really get many UAC prompts. What's all this talk about rearranging menu shortcuts? Why the heck would you do that when you can just type the app name and press ENTER using LiveSearch.

    I guess I'll be modded down for admitting to liking Vista but am I really alone?

  • How UAC could work (Score:3, Insightful)

    by kimvette ( 919543 ) on Friday October 10, 2008 @04:25PM (#25332059) Homepage Journal

    UAC was, by Microsoft admission, designed to be as annoying as possible. This was a HUGE mistake, because that is precisely how, aside from security holes inherent to Windows' architecture, that spyware got to be so ubiquitous. I have clients who by their own admission will click "yes" to every damn dialog just to get them out of the way and get back to work. One of them said they'll keep having us come back to clean up their computers rather than change their behavior. I know I should be glad for the repeat revenue, but it's damn annoying when I know it could have been designed a lot better.

    Why couldn't UAC either:

      1. Elevate the user's privileges globally for a period of time, like sudo on *nix, or the analogous mechanism in Apple's OS X desktop environment?

      2. Elevate the privileges of that process for a period of time?

      3. Just inform the user "You must log in as Administrator to perform that task." and then disable UAC while logged in as Administrator (hey, that would be just like *nix! No nagging "are you sure" B.S. when root!)

      4. Ditch backwards compatibility, relegating it (backwards compatibility) to a VirtualPC-sandboxed WinXP environment?

    • Re: (Score:3, Insightful)

      1. Possible, but problematic. sudo doesn't modify it globally if I recall, just for apps launched out of the same window. Don't know about Apple's mechanism. If it was actually global, user level malware would just have to wait for a privilege escalation before performing their nastiness.
      2. It does elevate the process and all sub-processes (thus, launching an Admin command prompt will allow you to launch anything else as Admin), but frequently programs are designed so a number of sub-processes perform privil

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...