Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows IT

"Very Severe Hole" In Vista UAC Design 813

Cuts and bruises writes "Hacker Joanna Rutkowska has flagged a "very severe hole" in the design of Windows Vista's User Account Controls (UAC) feature. The issue is that Vista automatically assumes that all setup programs (application installers) should be run with administrator privileges — and gives the user no option to let them run without elevated privileges. This means that a freeware Tetris installer would be allowed to load kernel drivers. Microsoft's Mark Russinovich acknowledges the risk factor but says it was a 'design choice' to balance security with ease of use."
This discussion has been archived. No new comments can be posted.

"Very Severe Hole" In Vista UAC Design

Comments Filter:
  • by croddy ( 659025 ) on Tuesday February 13, 2007 @05:11PM (#18003120)
    Well, as long as your OS still relies on the ancient "executable installer" model for software distribution, you're going to be stuck making design decisions to accomodate that model. Things like APT have other nightmare scenarios (what if someone compromises the repository?), but not having to run shitty little EXEs to install applications isn't something I miss from Windows.
  • Re:So what's new? (Score:3, Informative)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday February 13, 2007 @05:13PM (#18003168) Homepage Journal

    I believe that even RPM on linux runs the install scripts with admin access...

    If you install an RPM of unknown providence, you deserve what you get.

    Otherwise, the packages are presumed to have been tested by the maintainers and to not destroy your system.

    There is no such structure in Windows-land. You clearly do not understand how the system works if you think the two are comparable.

  • Re:So what's new? (Score:5, Informative)

    by DoofusOfDeath ( 636671 ) on Tuesday February 13, 2007 @05:15PM (#18003220)

    I believe that even RPM on linux runs the install scripts with admin access...

    Yes, but at least in the RPM case, a regular unprivileged user cannot cause an untrusted program to run with kernel-level permissions. In Linux, that user would have to enter a privileged password (for sudo or root login). On Vista, a regular user who has no admin rights can choose to execute an installer program with kernel privileges.
  • by KingSkippus ( 799657 ) * on Tuesday February 13, 2007 @05:18PM (#18003268) Homepage Journal

    That's the thing. Most of the prompts I was getting was not from software trying to do stuff, it was from normal operating system operations such as copying/moving/renaming/deleting files. Not OS files, but my own documents in my user directory. Not programmatically, but from me personally interacting with Explorer to manage my data. Stuff like changing the layout of my Start menu. Stuff like changing my desktop background. Stuff like copying a line of text from a web page in IE7 to paste in a document.

  • by Rycross ( 836649 ) on Tuesday February 13, 2007 @05:20PM (#18003304)
    Er what? For me, it only gave the nag screen when accessing the control panel, installing software, running software with administrative priveledges, or running Visual Studio. The Visual Studio thing is annoying, but other than that, all of the other things are the exact same sort of things that I have to sudo for in Linux. Except I'm not having to enter a password, just click a box. I'm not sure where the big gripe comes from, and honestly I feel like people are blowing it way out of proportion. Unless I'm coding (opening and closing Visual Studio) or changing the configuration of my machine, I never see the UAC box. So I barely see it during normal usage.
  • by Sycraft-fu ( 314770 ) on Tuesday February 13, 2007 @05:22PM (#18003326)
    If you are a standard user, you have to enter a password to elevate privileges. However Vista has a compromise mode of sorts. You can run as an administrator, but leave UAC on. This allows you to elevate without entering a password. You still have to elevate privilege, but it requires no password. Turning UAC off makes administrator accounts function as they did in XP where you have privilege at all times.
  • Re:Another approach. (Score:3, Informative)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday February 13, 2007 @05:26PM (#18003402) Homepage Journal

    Why not just let the user copy the application bundle to wherever they have write permissions? That application then executes with the privileges of the user that invokes it. If only there was a platform that offered such a simple an effective solution.

    Just to be a pedant, I would like to mention that you can in fact do this on Windows. However, applications developers seem to be in love with the registry, despite the fact that it really offers them no benefits whatsoever. I mean, it's slower than just putting all that data in flat files...

    I have lots of programs that work fine when I just copy them from one windows installation to another. Most of them are in my games folder, though.

  • by Anonymous Coward on Tuesday February 13, 2007 @05:28PM (#18003452)
    I've been running Vista RTM since release and I hardly see any UAC prompts. The only times are when I run VMware or install a program.

    You want to run an application, is that okay?
    That's the applications fault. Most applications shouldn't need administrative rights to run, and if they've been written properly they won't prompt. WinRAR 3.61 never prompts for me, but 3.62 has UAC prompts for everything. AFAIK "Windows XP Certified" programs require programs to be written so that they can run without elevated privileges so this is nothing new. People just assumed that everyone would run in an Administrator account and ignored those guidelines.

    You want to copy a file, is that okay?

    That never happens unless you're copying files into protected directories such as Program Files or the Windows directory. I copy files around all the time without UAC prompts because I keep them in my User directories or an external hard drive.

    You want to change your desktop background, is that okay?
    This is just FUD. That never happens. If you right click on an image in IE7 and set it to background a regular IE prompt will appear, but no UAC.

    You want to copy text from IE7, is that okay?
    I can copy text just fine, doesn't seem to prompt for me.

    You want to delete an old text file, is that okay?
    See above, only in restricted directories.

    You want to paste text into a form field in IE7, is that okay?
    I just tried copy and pasting info into the login page at Bank of America and I get no prompts. Even copy and pasting into sensitive fields such as "Social Security Number" on a Citibank credit card application resulted in zero prompts.

    UAC prompts are annoying and frequent when you first do a complete reinstall because you'll be installing applications and drivers that need elevated privileges. After that you should not encounter it in your day to day activities. I see a UAC prompt once a day and that's only because I use VMware. If I used Virtual PC I could avoid it completely.

    MOST computer users buy their PCs from Dell, HP, etc and they are preloaded with drivers and some basic software. The regular user won't be seeing as many UAC prompts because they'll be installing only a few programs (music player, possible word processing, games).
  • Re:Another approach. (Score:3, Informative)

    by nadamsieee ( 708934 ) on Tuesday February 13, 2007 @05:33PM (#18003510)

    a Mac concept that has been replicated on Linux about a dozen times but has never taken.

    A user has had the ability to install stuff in her home directory on POSIX machines for oh... probably since POSIX machines have been around. This isn't a "Mac concept". At most Apple has polished the idea to make it easy for non-geeks. And don't forget that OS X a.k.a Darwin is a POSIX-like implementation.

  • by ThinkFr33ly ( 902481 ) on Tuesday February 13, 2007 @05:43PM (#18003690)

    Not OS files, but my own documents in my user directory.
    I find that hard to believe, unless you're talking about pre-RC2 Vista. Operations on files which you own or have normal permissions to, such as all the files in your user directory, do *not* cause a UAC prompt. Simple as that. Think of it this way, if you were on Unix, it would simply deny you access to the file in question. You would then have to su root to get the job done. In Vista, it makes that elevation a lot faster and easier.

    For repeated, but seperate operations (like installing a lot of applications when you're setting up your machine), you can disable UAC. This is basically the same thing as su root if your account is an admin account. Once you're done, re-enable it. It's really not that hard.

    Stuff like changing the layout of my Start menu.
    You'll only get a UAC prompt when modify start menu folders that are shown to all users. Why? Because these aren't folders you own. See my previous point. Also, why bother rearranging start menu folders in Vista? If you want to find something, type in the first couple of letters and it appears. It's MUCH faster than drilling down through folders.

    Stuff like changing my desktop background. Stuff like copying a line of text from a web page in IE7 to paste in a document.
    You're either making this up, or you were using something that was even pre-pre RC1. This simply does not happen with Vista post-RC1.
  • by The MAZZTer ( 911996 ) <.moc.liamg. .ta. .tzzagem.> on Tuesday February 13, 2007 @05:48PM (#18003776) Homepage

    NTFS partitions NOT created by Vista will cause these prompts for file operations on them, because you do not have access to them. #1: Your XP user account does but it is not recognized by Vista. #2: Administrators permissions is only granted after a UAC prompt. #3: Users permissions are normally low. Hence the need to prompt you to get the proper permissions.

    Fortunately this is easy to fix. Simply go into the security settings in the property pages of a folder (or the whole drive if you wish) and add your personal account to the access list with full control. This will eliminate the prompts. Alternately on a multi-user computer you can adjust the permissions of the Users group for the same effect.

  • Re:Another approach. (Score:5, Informative)

    by TheRaven64 ( 641858 ) on Tuesday February 13, 2007 @05:59PM (#18003926) Journal
    Actually, the concept was on the original Mac before NeXT existed. Mac applications would have the executable in the data fork, and any supporting 'files' in the resource fork. NeXT didn't want to implement forks, so they used folders instead. This let them store applications on filesystems that didn't support forks (e.g. FAT, UFS, etc), and so was probably a better solution.
  • by Chokolad ( 35911 ) on Tuesday February 13, 2007 @06:01PM (#18003942)
    I still don't understand where the supposed security gain is. Since when is malware unable to click ok itself?

    UAC prompt opens in separate logical desktop. Applications from main desktop can not send windows messages to it which means malware will be unable to click ok itself.
  • by Anonymous Coward on Tuesday February 13, 2007 @06:01PM (#18003950)
    Um, I think that he is saying that "do you want to delete file?" is a standard question. Win95 had it, mac os has it; Most Linux distributions are configured with rm in interactive mode.
  • by ruiner13 ( 527499 ) on Tuesday February 13, 2007 @06:08PM (#18004054) Homepage
    No, it is completely different. For an MSI to run on windows, it needs to use the installer SERVICE which is running under the sytem account. This means that any installer inherently is running through a system user account. And if you had read the article, EVERY installer asks to be run as administrator in Vista, regardless of its intent. There is no exception made for a game, such as Tetris. RTFA yourself.
  • Re:Another approach. (Score:3, Informative)

    by tomhudson ( 43916 ) <barbara,hudson&barbara-hudson,com> on Tuesday February 13, 2007 @06:11PM (#18004080) Journal
    That's how most programs installed under DOS, so it definitely predates Darwin. Who'd have thought that DOS was more POSIX than Windows (at least in this one area)?
  • A bit different... (Score:3, Informative)

    by eklitzke ( 873155 ) on Tuesday February 13, 2007 @06:12PM (#18004104) Homepage
    I am far from an RPM guru... but I have written a few in my day. Basically the way that an RPM works is you write a spec file which is just a script that tells RPM what actions to perform to install the actual binary. For example, put this file here, change its permissions, restart the running daemon associated with this package, etc. AFAIK the set of commands that you can give to RPM is limited, and I believe that you are not able to tell it to do things like load kernel modules. So sure, if you install an untrusted RPM it can do all kinds of nasty things like clobber your files, but there are limitations to what RPM can do. If you're really paranoid you can also run rpm with SELinux, which obviously has no analog in the Windows world.
  • by Doctor Crumb ( 737936 ) on Tuesday February 13, 2007 @06:15PM (#18004166) Homepage
    Sorry, but linux and OSX only ask you for your password when doing potentially dangerous things. You are not prompted when moving files from one of your own folders to another of your own folders. You are not prompted when editing your own menus. You ARE prompted when doing something that will affect other users of the system, such as installing software site-wide. If you want to install a warez server under your own home folder, go nuts, you already explicitly have permission to do so.

    Of course, linux and OSX have fine-grained mechanisms to grant/revoke permissions for any file, folder, or program. If I wanted to install openoffice as my cousin vinnie, I could do so. Vista's all-or-nothing UAC is nothing more than an attempt to shift blame to the users, so that MS can claim to provide better security than ever before.
  • Re:Another approach. (Score:4, Informative)

    by QuantumG ( 50515 ) * <qg@biodome.org> on Tuesday February 13, 2007 @06:18PM (#18004220) Homepage Journal
    Sigh. The *point* of an App bundle is that you don't "extract" it. The OS knows how to read these things and treats them as part of the filesystem.
  • by 787style ( 816008 ) on Tuesday February 13, 2007 @06:26PM (#18004336)
    Since Program Files shouldn't be world writable, this should prompt you for the administrator password. This authoriation should then be cached for Explorer.exe.

    The underlying problem here is exactly how much explorer.exe is tasked to do. It's the start button, the file explorer, and can be a launcher application. If explorer.exe is ever trusted, it is never unloaded from memory and is always running. You would have to spawn a new process for each instance, and have to trust each instance for that to begin to work, but we've just failed by having to reauthorize each instance.

    Vista:You are trying to copy from a network share to the program files folder. This isn't allowed. Hit ok.

    That's just idiotic.


    I couldn't believe it when I read it. And it is so incredibly easy to defeat, I just don't see the point. Any malicious code simply drops itself into the root of the drive before shoving itself into program files. Not that there is any particular gain to be had, except maybe replacing executables. Again, this is easily bypassed.
  • by Rycross ( 836649 ) on Tuesday February 13, 2007 @06:30PM (#18004396)

    Sorry, but linux and OSX only ask you for your password when doing potentially dangerous things. You are not prompted when moving files from one of your own folders to another of your own folders. You are not prompted when editing your own menus.


    In theory UAC should behave like this as well. UAC is mostly a way of elevating priveledges, just like sudo, minus the password. Administrators on Windows actually run under lower priveledge accounts, and then elevate for specific tasks that require administrator priveledges.

    See, the real problem is so many things in Windows requires Administrator by default. Even stuff that shouldn't. Thats the real problem here.

    Of course, linux and OSX have fine-grained mechanisms to grant/revoke permissions for any file, folder, or program. If I wanted to install openoffice as my cousin vinnie, I could do so.


    You can do this in Window's too. It has a "Run As" option, and ACLs that let you any arbitrary number of users or groups' access to the file.
  • by KingSkippus ( 799657 ) * on Tuesday February 13, 2007 @06:36PM (#18004462) Homepage Journal

    I'm sorry, exactly where did I say that it was acceptable in OS X or Linux? Seriously, point it out, because I honestly don't remember saying anything like that.

    Since you brought it up, though, yes, Linux could definitely use some work in this area. I also get tired of sudo password prompts for doing some basic system configuration and maintenance tasks, especially stuff that only applies to my account, not the OS as a whole. If you want me to jump on the bandwagon of having less stuff requiring admin access in Linux, count me in. I can't speak for OS X because I've never used it.

    However, in defense of Linux, Vista is much worse. I've never had a prompt pop up in Linux that expressed concern because I was copying text from my browser to the clipboard. In Vista, I did. It may sound petty and silly, but it was the proverbial straw that broke the camel's back. The truth is, though, that I was constantly being prompted to do stuff that had nothing even remotely to do with system configuration or administration. Stupid stuff like renaming a file that was nowhere near a system directory. Stupid stuff like running a program that doesn't even come close to touching kernel code. Stupid stuff like... Well, you get the idea, I'm not going to sit here and list every stupid prompt I got.

    So am I Microsoft-bashing? Yeah, I suppose I am. But it's not because I have an ax to grind with the company or because I think the alternative is perfect, it's because this particular product truly sucks ass. Yes, I know that there are zealots out there who would complain no matter how well Vista might have worked, but if you think I'm one of them or that's why I posted my message, you're barking up the wrong tree.

    (Have you tried Vista yet?)

  • by Traiklin ( 901982 ) on Tuesday February 13, 2007 @06:37PM (#18004480) Homepage
    [blockquote]It's really not that hard. UNIX/sudo got this right god knows how long ago. Apple did the right thing and just copied the sudo mechanism wholesale. Microsoft should to.[/blockquote] Well we can't have that, cause then there will be a story on here going on about how Microsoft stole from Unix, then we get 800 comments about how microsoft is evil for doing it, yet no one will mention that Apple did the same thing cause they aren't the evil microsoft.
  • by Rycross ( 836649 ) on Tuesday February 13, 2007 @06:45PM (#18004586)
    What kind of text were you copying exactly? I'd like to try and recreate this when I get home. Are you sure it was Vista and not just an IE7 specific anti-phishing technique? I ask because I haven't had this problem at all in Firefox 2.0, and I can see them preventing the copying of URLs so that users aren't phished by an email that says something like "Copy and paste this url in a new browser window, and then enter your account information. And remember to never click on links in an email!"
  • Re:What? (Score:3, Informative)

    by ivan256 ( 17499 ) on Tuesday February 13, 2007 @06:58PM (#18004730)

    This is no different from if you tried to delete a file on your Linux box that you didn't own. You would be forced to elevate your user to delete the file.


    Actually it is different....

    In a Unix shell when you run rm on a file you don't have permissions to delete it fails. It doesn't offer to help you screw up.
  • by Anonymous Coward on Tuesday February 13, 2007 @07:02PM (#18004778)
    If it's such a pain for you just shut it off:

    Run MSCONFIG
    Click TOOLS
    Click DISABLE UAC
    Execute
    Reboot
  • by Anonymous Coward on Tuesday February 13, 2007 @07:03PM (#18004796)

    Sorry, but linux and OSX only ask you for your password when doing potentially dangerous things. You are not prompted when moving files from one of your own folders to another of your own folders. You are not prompted when editing your own menus. You ARE prompted when doing something that will affect other users of the system, such as installing software site-wide
    You've actually just described how Vista UAC behaves. You get no prompt when moving files from your folders to your folders, you're not prompted when editing your own menus (unless you edit the 'all users' menu). You are prompted when you do stuff that will affect others.
    it sucked in the pre-beta days, but the released bits behave just as you describe. Anyone who says otherwise is mongering the FUD.
  • by Jherek Carnelian ( 831679 ) on Tuesday February 13, 2007 @07:18PM (#18005010)
    I actually use [Shift][Delete] almost exclusively.

    Me too. Yet on unix (csh/tcsh) I always do:

    alias rm 'ls \!* && echo -n "Remove (y/n)? " && if(y == $) /bin/rm -rf \!*'

    which, unlike "rm -i" prompts just once no matter how many files are being deleted.
    I've run that way for over 15 years now (damn, I'm getting old) and never once deleted something by mistake.
  • by Anonymous Coward on Tuesday February 13, 2007 @07:20PM (#18005038)

    For an MSI to run on windows, it needs to use the installer SERVICE which is running under the sytem account. This means that any installer inherently is running through a system user account.


    Incorrect. The MSI installer service impersonates the privileges of the user that launched the msiexec.exe program that initiated the installation of the MSI package for the duration of the install.

    Further, it is entirely possible to write an MSI package that can be run by a non-admin. Mostly, however, installers need to write to areas that make what's being installed available to some or all of the users of the system (e.g. \Program Files), and this quite properly requires admin rights.
  • by choseph ( 1024971 ) on Tuesday February 13, 2007 @07:21PM (#18005040)
    Then the article is wrong. You can manifest an installer or exe to default to admin and UAC prompts, or AsInvoker if you know you can install without special access (installing to a user directory only for example). You can see more information here: http://channel9.msdn.com/Showpost.aspx?postid=2112 71 [msdn.com]
  • by jZnat ( 793348 ) * on Tuesday February 13, 2007 @07:21PM (#18005050) Homepage Journal
    Problem solved [videolan.org]! Nowadays, most QuickTime movies are just H.264+AAC, both of which are MPEG-4 standards, so support for said media files is far more widespread than the old widely-used QuickTime audio and video codecs.
  • by Durandal64 ( 658649 ) on Tuesday February 13, 2007 @07:29PM (#18005166)
    At the command line, Apple simply uses sudo. At the GUI layer, the security architecture is more complex than sudo. It borrows some concepts, but only in a very limited sense. When you authenticate, you don't necessarily become root. Sometimes, you are just given permission to make modificaitons within a program, where root privileges aren't strictly required for anything, but the app's author wanted to restrict certain capabilities to admin users on the machine. Apple's security model is designed around requesting rights (like "com.apple.installer.installSoftware") from the security server, and those rights have certain properties that you can set, like a timeout, whether root privileges are actually required for this right, etc ... In many cases, you're authenticating for permission to run a SetUID command-line tool that's been factored out of the GUI app you're working in. For example, when you authenticate in Installer.app, Installer.app does not elevate to being run with root privileges. It launches a SetUID binary called "runner", which runs with as root.

    Apple copied sudo's idea of "least required privileges" as the basis of its GUI security model, but I don't know if sudo was the first example of LRP. Maybe it was. But the GUI security model is definitely more complex than sudo, and apparently, it's a hell of a lot better than what Microsoft came up with for Vista. Using heuristics to identify which executables should get admin rights just seems like a horrendously stupid idea. Microsoft should've put its foot down on this one and forced developers of installer applications to properly request credentials. But they chose backwards-compatibility, as always, and now they're basically guessing who needs admin rights and who doesn't.
  • by greed ( 112493 ) on Tuesday February 13, 2007 @07:36PM (#18005230)

    Apple didn't copy the sudo mechanism. They copied sudo itself, shipped it with the operating system, and used it from the GUI.

    So changing /etc/sudoers can affect the GUI. This can be important, because the default behavior is to cache credentials for 5 minutes, which can leave your system exposed to the next thing that wants Administrator privs. Changing the cache timeout to 0 fixes that, nicely.

  • by DigitAl56K ( 805623 ) on Tuesday February 13, 2007 @07:38PM (#18005278)

    From the NSIS (Nullsoft Scriptable Install System) documentation:

    RequestExecutionLevel none|user|highest|admin
    Specifies the requested execution level for Windows Vista. The value is embedded in the installer and uninstaller's XML manifest and tells Vista, and probably future versions of Windows, what privileges level the installer requires. user requests the a normal user's level with no administrative privileges. highest will request the highest execution level available for the current user and will cause Windows to prompt the user to verify privilege escalation. The prompt might request for the user's password. admin requests administrator level and will cause Windows to prompt the user as well. Specifying none, which is also the default, will keep the manifest empty and let Windows decide which execution level is required. Windows Vista automatically identifies NSIS installers and decides administrator privileges are required. Because of this, none and admin have virtually the same effect.

    It's recommended, at least by Microsoft, that every application will be marked with the required execution level. Unmarked installers are subject to compatibility mode. Workarounds of this mode include automatically moving any shortcuts created in the user's start menu to all users' start menu. Installers that need not install anything into system folders or write to the local machine registry (HKLM) should specify user execution level.

    More information about this topic can be found at MSDN. Keywords include "UAC", "requested execution level", "vista manifest" and "vista security".

    So it seems that there is an option, "user", which might cause NSIS to run in non-admin (depending on whether Vista's auto-handling is overriding), and that other installers might also be able to run non-admin.
  • by Chris Burke ( 6130 ) on Tuesday February 13, 2007 @07:42PM (#18005326) Homepage
    cause then there will be a story on here going on about how Microsoft stole from Unix, then we get 800 comments about how microsoft is evil for doing it, yet no one will mention that Apple did the same thing cause they aren't the evil microsoft.

    Whatever. For starters, Apple didn't just steal from Unix, they build their OS on top of Unix. And you can't read any article on OSX around here without a dozen posts pointing that out, so the "no one will mention" part is just crap. Of course Apple never hid the fact that they were "stealing" Unix by building their OS on top of BSD. The whole point being to start with a solid OS with all these great Unixy concepts built in and add their Apply interface on top. Whereas when Microsoft steals these features after another five years, they'll act like they were struck by inspiration out of the blue and done something that nobody's done before, like they have with every other idea they've stolen. So the "did the same thing" part is crap too.

    It may be fun and easy to take a poke at the "/. doublestandard", but it only reveals that you don't understand that it isn't a double standard at all. Microsoft has a bad rep for a reason among those who have been paying attention, and hey, maybe you don't know or understand why but don't think Apple would get a pass if they truly did the same things Microsoft does.

    Next up: Why viewing Halliburton in a harsher light than Bob's General Contracting is also not an unfair double standard.
  • by RzUpAnmsCwrds ( 262647 ) on Tuesday February 13, 2007 @07:49PM (#18005404)

    You ARE prompted when doing something that will affect other users of the system


    You mean like modifying files that you don't have ownership of?

    UAC does not, and has never, prompted users when they move files that they have permissions to. It does, however, prompt when you move files that are in the common desktop or in the common start menu folders.

    Of course, linux and OSX have fine-grained mechanisms to grant/revoke permissions for any file, folder, or program.


    Clearly, you don't understand anything about how Windows works. Windows has had access control lists practically everywhere in the OS since Windows NT.

    Oh, and the ACLs in Windows are far, far more "fine-grained" than the usable-but-primitive permission bits in Linux.

  • by init100 ( 915886 ) on Tuesday February 13, 2007 @07:51PM (#18005426)

    Places that make absolutely no sense, such as storing wireless settings. There is no reason that action should require admin privileges and thus a prompt.

    Actually, wireless settings are systemwide settings, and would probably require a prompt even in Linux.

  • by David Horn ( 772985 ) <david&pocketgamer,org> on Tuesday February 13, 2007 @08:03PM (#18005566) Homepage
    I've just tried this on Vista Ultimate edition, and experienced no problems at all, apart from a UAC warning asking me if I really wanted to dump an unknown executable into my Program Files directory (and for some reason, a warning saying that a UAC warning was about to appear...).

    However, I suspect the GP is talking out of his arse. The file was from another PC, in another workgroup, drag-and-dropped straight into the Program Files directory. I even tried it in the Windows folder, and it was fine.
  • by Jherek Carnelian ( 831679 ) on Tuesday February 13, 2007 @08:21PM (#18005772)
    slashdot ate the alias, it should say

    alias rm 'ls \!* && echo -n "Remove (y/n)? " && if(y == $<) /bin/rm -rf \!*'
  • Re:Another approach. (Score:3, Informative)

    by jZnat ( 793348 ) * on Tuesday February 13, 2007 @09:07PM (#18006296) Homepage Journal
    You do know that app bundles are just directories called "ApplicationName.app", right? They are part of the file system. Also, those DMG files you get them from? Those are HFS+ (the file system format on OS X) images (similar to how ISO files are images of ISO-9660 file systems) which is why they get mounted.
  • by QuantumG ( 50515 ) * <qg@biodome.org> on Tuesday February 13, 2007 @09:49PM (#18006692) Homepage Journal
    http://www.youtube.com/watch?v=FfetbidVUYw [youtube.com]

    there's a link for people who prefer not to download an 18.8mb codec.

  • by pherthyl ( 445706 ) on Tuesday February 13, 2007 @10:27PM (#18006986)
    Sorry, I wasn't quite clear. By wireless settings I meant things like saving a network to connect to later, not settings for the card. Networkmanager in Linux does not require root privileges to do that.
  • by shmlco ( 594907 ) on Tuesday February 13, 2007 @10:40PM (#18007062) Homepage
    "I don't want to wonder if my computer is tattling on me if I'm downloading an mp3..."

    Forget your computer, worry about those logs your ISP is keeping.
  • by Combuchan ( 123208 ) <sean@em[ ].net ['vis' in gap]> on Tuesday February 13, 2007 @11:47PM (#18007516) Homepage
    I could spend a lot of time beriding your ignorance, but instead, you can google three words--linux extended attributes--and you will understand for yourself.
  • by WWWWolf ( 2428 ) <wwwwolf@iki.fi> on Wednesday February 14, 2007 @03:00AM (#18008698) Homepage

    Oh, and the ACLs in Windows are far, far more "fine-grained" than the usable-but-primitive permission bits in Linux.

    Uh, Linux has supported POSIX Access Control Lists and Extended Attributes for quite a while now.

    Heck, it dates from the days when ext2 was the king of filesystems, and that's a long way back. (Granted, at least on ext3, you have to specifically turn them on in mount options or with tune2fs, but on XFS, JFS and (to my knowledge) Reiser3 and 4, they're supported out of box.)

    And when people say POSIX, they mean "real *nixes have had these features for, like, centuries". =)

    What you're saying next? "Active Directory is so much more better authentication system than /etc/passwd, which is also a security risk that exposes encrypted passwords to users"? =)

  • by Allador ( 537449 ) on Wednesday February 14, 2007 @03:04AM (#18008716)
    This is commonly done in Windows in one of two ways:

    1. Use RunAs to fire off a new explorer.exe process running in admin mode. Then do as much work as you want, as long as the process is started from that window, its all in admin mode. It's basically almost like firing up a term-serv window into your own machine. MakeMeAdmin is the same thing, but adds the elevated priv tokens to your regular profile for that one process (rather than starting a process in a different user profile).

    2. Use RunAs to fire off a new cmd.exe shell running in admin mode. Then do as much work as you want as admin.

    Now granted, UAC is sort of a weird hybrid thing, where you run as admin but cant do admin stuff without answering the prompt. But just turn UAC off, work as a non-admin (like a sane person), and use RunAs when you need it.

Suggest you just sit there and wait till life gets easier.

Working...