Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Did You Guys Hear...

Did You Guys Hear...

Scheduled Pinned Locked Moved The Lounge
securityquestion
60 Posts 31 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Steve Thresher

    This is a good idea. Honest developers don't need to do anything to their installer other than change the name to get elevated permissions. Spyware programs cannot run without confirmation from the operator. The only problem I can see is if your everyday application is called setup or install which would seem very unlikely. Read this[^] for more information.

    AxisFirst For Business

    D Offline
    D Offline
    Dave Sexton
    wrote on last edited by
    #34

    Steve Thresher wrote:

    Honest developers

    And the dishonest ones?

    1 Reply Last reply
    0
    • S Steve Thresher

      This is a good idea. Honest developers don't need to do anything to their installer other than change the name to get elevated permissions. Spyware programs cannot run without confirmation from the operator. The only problem I can see is if your everyday application is called setup or install which would seem very unlikely. Read this[^] for more information.

      AxisFirst For Business

      J Offline
      J Offline
      JimmyRopes
      wrote on last edited by
      #35

      Steve Thresher wrote:

      Spyware programs cannot run without confirmation from the operator

      Unless they are named Boffo.exe! :rolleyes:

      Simply Elegant Designs JimmyRopes Designs
      Think inside the box! ProActive Secure Systems
      I'm on-line therefore I am. JimmyRopes

      A 1 Reply Last reply
      0
      • S Steve Thresher

        This is a good idea. Honest developers don't need to do anything to their installer other than change the name to get elevated permissions. Spyware programs cannot run without confirmation from the operator. The only problem I can see is if your everyday application is called setup or install which would seem very unlikely. Read this[^] for more information.

        AxisFirst For Business

        H Offline
        H Offline
        hlmechanic
        wrote on last edited by
        #36

        I hope malware writers don't rename there files to something less suspecious , like say, cute.scr or something becose then it would go right past. Hope they all stay named, oh, virus_installer.exe or something.:wtf:

        R S V 3 Replies Last reply
        0
        • R realJSOP

          ...that Vista determines what apps should be run with admin privileges based on the name of the executable? If the name of your exe includes "Install", Vista will require admin rights for it to run. If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run. Microsoft claims it was a method for preventing malware to run, but now that the malware authors know about it, I guess it's been reduced to yet another pointless "security" feature. Way to go, MS!

          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
          -----
          "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

          W Offline
          W Offline
          WillemM
          wrote on last edited by
          #37

          I knew Vista did that, I find it kinda lame. But at least it works :)

          WM. What about weapons of mass-construction? "What? Its an Apple MacBook Pro. They are sexy!" - Paul Watson

          1 Reply Last reply
          0
          • R realJSOP

            ...that Vista determines what apps should be run with admin privileges based on the name of the executable? If the name of your exe includes "Install", Vista will require admin rights for it to run. If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run. Microsoft claims it was a method for preventing malware to run, but now that the malware authors know about it, I guess it's been reduced to yet another pointless "security" feature. Way to go, MS!

            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
            -----
            "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

            A Offline
            A Offline
            Anna Jayne Metcalfe
            wrote on last edited by
            #38

            The alternative would have been for every installer to be modified to include an application manifest with admin privilege levels. Given that this would have been commercial suicide, MS took the safe option - no matter how bodgy it appears. Remember that if an app is deemed as requiring admin permissions and UAC is on you'll get a UAC prompt - the "installer" won't get those permissions automatically. So malware disguised as an installer still needs "some idiot" to press the big red button (which they probably will, but then some people can't be helped...) before it can do it's worst.

            Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

            R 1 Reply Last reply
            0
            • J JimmyRopes

              Steve Thresher wrote:

              Spyware programs cannot run without confirmation from the operator

              Unless they are named Boffo.exe! :rolleyes:

              Simply Elegant Designs JimmyRopes Designs
              Think inside the box! ProActive Secure Systems
              I'm on-line therefore I am. JimmyRopes

              A Offline
              A Offline
              Anna Jayne Metcalfe
              wrote on last edited by
              #39

              In which case they don't get admin privileges. As simple a thing as attempting to write to the Local Machine hive will result in E_ACCESS_DENIED. :)

              Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

              M 1 Reply Last reply
              0
              • D Dario Solera

                You should try with a normal user account, not administrator.

                ________________________________________________ Personal Blog [ITA] - Tech Blog [ENG] - My Photos ScrewTurn Wiki 2.0.4

                L Offline
                L Offline
                lost in transition
                wrote on last edited by
                #40

                Trust me here at this place I do not have an administrator account.


                God Bless, Jason
                Programmer: A biological machine designed to convert caffeine into code.
                Developer: A person who develops working systems by writing and using software. [^]

                P 1 Reply Last reply
                0
                • H hlmechanic

                  I hope malware writers don't rename there files to something less suspecious , like say, cute.scr or something becose then it would go right past. Hope they all stay named, oh, virus_installer.exe or something.:wtf:

                  R Offline
                  R Offline
                  Rajesh R Subramanian
                  wrote on last edited by
                  #41

                  Yes. The common name of the virus is included at the end. For example, a virus might be named something like INSTALL_VIRUS_W32.KWBOT.F.WORM.EXE That is the prescribed standard.


                  Nobody can give you wiser advice than yourself. - Cicero

                  C 1 Reply Last reply
                  0
                  • R Rajesh R Subramanian

                    Yes. The common name of the virus is included at the end. For example, a virus might be named something like INSTALL_VIRUS_W32.KWBOT.F.WORM.EXE That is the prescribed standard.


                    Nobody can give you wiser advice than yourself. - Cicero

                    C Offline
                    C Offline
                    Chris Losinger
                    wrote on last edited by
                    #42

                    brahmma wrote:

                    That is the prescribed standard.

                    last i heard, the ISO was still debating this. there was a big disagreement over backwards compatibility with 8.3 systems. but, IMO, that needs to be split into a separate standard.

                    image processing toolkits | batch image processing | blogging

                    R 1 Reply Last reply
                    0
                    • R Rajesh R Subramanian

                      John Simmons / outlaw programmer wrote:

                      If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run.

                      Microsoft: "Boffo" added to the list :cool: Now anything with "boffo" in its name will require admin priveleges!

                      found at bash.org [kernx]|.|.|.|.|.|.|.| [kernx]sorry, wrong window [beox33]say me why in the f*ck will you type that in any window

                      M Offline
                      M Offline
                      megaadam
                      wrote on last edited by
                      #43

                      So with this latest extension, Vista has increased it's security...:suss:

                      1 Reply Last reply
                      0
                      • A Anna Jayne Metcalfe

                        The alternative would have been for every installer to be modified to include an application manifest with admin privilege levels. Given that this would have been commercial suicide, MS took the safe option - no matter how bodgy it appears. Remember that if an app is deemed as requiring admin permissions and UAC is on you'll get a UAC prompt - the "installer" won't get those permissions automatically. So malware disguised as an installer still needs "some idiot" to press the big red button (which they probably will, but then some people can't be helped...) before it can do it's worst.

                        Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                        R Offline
                        R Offline
                        realJSOP
                        wrote on last edited by
                        #44

                        Anna-Jayne Metcalfe wrote:

                        an installer still needs "some idiot" to press the big red button

                        There is no shortage of those.

                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                        -----
                        "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                        A 1 Reply Last reply
                        0
                        • H hlmechanic

                          I hope malware writers don't rename there files to something less suspecious , like say, cute.scr or something becose then it would go right past. Hope they all stay named, oh, virus_installer.exe or something.:wtf:

                          S Offline
                          S Offline
                          Steve Thresher
                          wrote on last edited by
                          #45

                          You're an idiot. See Anna-Jayne's replies.

                          AxisFirst For Business

                          1 Reply Last reply
                          0
                          • H hairy_hats

                            This works in XP too - try making a copy of notepad.exe and call it install.exe. :rolleyes:

                            V Offline
                            V Offline
                            Vikram A Punathambekar
                            wrote on last edited by
                            #46

                            I remember seeing this behavior on XP years back. I was too lazy to log out (I'm a local admin) and check as I was having a lot of apps running, and went down to play TT. :->

                            Cheers, Vikram.


                            "But nowadays, it means nothing. Features are never frozen, development keeps happening, bugs never get fixed, and documentation is something you might find on wikipedia." - Marc Clifton on betas.

                            Join the CP group at NationStates. Password: byalmightybob

                            1 Reply Last reply
                            0
                            • H hlmechanic

                              I hope malware writers don't rename there files to something less suspecious , like say, cute.scr or something becose then it would go right past. Hope they all stay named, oh, virus_installer.exe or something.:wtf:

                              V Offline
                              V Offline
                              Vikram A Punathambekar
                              wrote on last edited by
                              #47

                              I find it incredible that you've got two 5 votes. It's normal programs called "Setup.exe" or "Install.exe" that require admin privileges, not the other way round. Unless, of course, that was sarcasm.

                              Cheers, Vikram.


                              "But nowadays, it means nothing. Features are never frozen, development keeps happening, bugs never get fixed, and documentation is something you might find on wikipedia." - Marc Clifton on betas.

                              Join the CP group at NationStates. Password: byalmightybob

                              R 1 Reply Last reply
                              0
                              • R realJSOP

                                ...that Vista determines what apps should be run with admin privileges based on the name of the executable? If the name of your exe includes "Install", Vista will require admin rights for it to run. If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run. Microsoft claims it was a method for preventing malware to run, but now that the malware authors know about it, I guess it's been reduced to yet another pointless "security" feature. Way to go, MS!

                                "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                -----
                                "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                                M Offline
                                M Offline
                                Mike Dimmick
                                wrote on last edited by
                                #48

                                This is intended as a compatibility feature. Most legacy installers don't work right if they run under the low-privileged rights of a non-elevated administrator. Therefore there are a number of heuristics to detect installers and force elevation if an installer program is detected. If you run with UAC enabled, you get a UAC prompt before the elevation can occur. (If you're running as a standard user, you will get the over-the-shoulder password prompt instead). If you run with UAC disabled, and you log in as an administrator, or you log in as the Administrator account with UAC enabled, all code is running with administrative rights and privileges anyway. If you're writing code that targets Windows Vista you should include a manifest which declares what your program actually does. This suppresses all the legacy detection, including this, and registry and file system redirection.

                                Stability. What an interesting concept. -- Chris Maunder

                                1 Reply Last reply
                                0
                                • A Anna Jayne Metcalfe

                                  In which case they don't get admin privileges. As simple a thing as attempting to write to the Local Machine hive will result in E_ACCESS_DENIED. :)

                                  Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                                  M Offline
                                  M Offline
                                  Mike Dimmick
                                  wrote on last edited by
                                  #49

                                  No manifest, so it'll get redirected if it writes to HKLM\Software rather than ERROR_ACCESS_DENIED. If you include a Vista UAC manifest, the installer detection does not occur and the elevation will depend on what you put in your manifest. asInvoker - never prompts highestAvailable - asks administrators to elevate but doesn't do an over-the-shoulder (OTS) prompt for standard users, just runs low-privileged requireAdministrator - prompts administrators to confirm, OTS prompt for standard users Those are the defaults - an administrator can change whether admins see the confirm or OTS prompt, and whether standard users see the OTS prompt or it simply fails to run.

                                  Stability. What an interesting concept. -- Chris Maunder

                                  A 1 Reply Last reply
                                  0
                                  • M Mike Dimmick

                                    No manifest, so it'll get redirected if it writes to HKLM\Software rather than ERROR_ACCESS_DENIED. If you include a Vista UAC manifest, the installer detection does not occur and the elevation will depend on what you put in your manifest. asInvoker - never prompts highestAvailable - asks administrators to elevate but doesn't do an over-the-shoulder (OTS) prompt for standard users, just runs low-privileged requireAdministrator - prompts administrators to confirm, OTS prompt for standard users Those are the defaults - an administrator can change whether admins see the confirm or OTS prompt, and whether standard users see the OTS prompt or it simply fails to run.

                                    Stability. What an interesting concept. -- Chris Maunder

                                    A Offline
                                    A Offline
                                    Anna Jayne Metcalfe
                                    wrote on last edited by
                                    #50

                                    My mistake. :-O Either way, it won't be able to gain admin access.

                                    Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                                    1 Reply Last reply
                                    0
                                    • R realJSOP

                                      Anna-Jayne Metcalfe wrote:

                                      an installer still needs "some idiot" to press the big red button

                                      There is no shortage of those.

                                      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                      -----
                                      "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                                      A Offline
                                      A Offline
                                      Anna Jayne Metcalfe
                                      wrote on last edited by
                                      #51

                                      On that we're agreed. :doh:

                                      Anna :rose: Linting the day away :cool: Anna's Place | Tears and Laughter "If mushy peas are the food of the devil, the stotty cake is the frisbee of God"

                                      1 Reply Last reply
                                      0
                                      • R realJSOP

                                        ...that Vista determines what apps should be run with admin privileges based on the name of the executable? If the name of your exe includes "Install", Vista will require admin rights for it to run. If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run. Microsoft claims it was a method for preventing malware to run, but now that the malware authors know about it, I guess it's been reduced to yet another pointless "security" feature. Way to go, MS!

                                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                        -----
                                        "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                                        J Offline
                                        J Offline
                                        Joshua Quick
                                        wrote on last edited by
                                        #52

                                        Hi John. You'll also run into this if the file is called Setup.exe. Plus, after closing the app, Vista will display a message stating that something went wrong with the install if it's not really an installer. I have found a work around. If you embed the following "trust info" into the EXE's manifest file, it will no longer require admin rights. Nor will it report that the installation failed either.

                                        <?xml version='1.0' encoding='utf-8' standalone='yes'?>
                                        <assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
                                        <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
                                        <security>
                                        <requestedPrivileges>
                                        <requestedExecutionLevel level="asInvoker" uiAccess="false"/>
                                        </requestedPrivileges>
                                        </security>
                                        </trustInfo>
                                        </assembly>

                                        1 Reply Last reply
                                        0
                                        • R realJSOP

                                          ...that Vista determines what apps should be run with admin privileges based on the name of the executable? If the name of your exe includes "Install", Vista will require admin rights for it to run. If you simple change the name of the exe to something like "Boffo", it will NOT require admin rights to run. Microsoft claims it was a method for preventing malware to run, but now that the malware authors know about it, I guess it's been reduced to yet another pointless "security" feature. Way to go, MS!

                                          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                          -----
                                          "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                                          E Offline
                                          E Offline
                                          Eytukan
                                          wrote on last edited by
                                          #53

                                          Just thought about an exe : "GetDownToDiskAndDestroy.exe". Vista must be saying a "welcome":sigh:


                                          Press: 1500 to 2,200 messages in just 6 days? How's that possible sir? **Dr.Brad :**Well,I just replied to everything Graus did and then argued with Negus for a bit.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups