PDA

View Full Version : Help me choose software for security please!



Olicaca
04-09-08, 12:06 PM
Hi every one.
I'm trying to find some program help me in the security problems.
What things i need for?It must be a program that help me control all
hidden executive and installation.I need it help me to monitor and
report me if a program is being installed to my system,help me monitor
all of its activities(creat files,del files,add value to
registry,modified files) and i can stop any action of its installation
at anytime i want.And i want it log every thing of that to a log file
so that i can view after if it's a malware.
And the second i need is a folder and files security program.I need a
program can help me control the folder access permission of the
system.Some folder can be use and modify by these program but cannot
be use by other program.Example:I download a program from the
internet,save into the folder A,IDM can access the folder A,write to
it but other cannot write to the folder A.Folder FX can be access by
the program X but others program cannot access FX and contrary,the
program A cannot access any folder else A.
For the second purpose,i did try the Universal Shield but it not work
excellently as my mine,now i'm still looking for these.
Anyone have the experience please help me,just give me the name of
them.I will thank very much!

Sebastian G.
04-09-08, 01:14 PM
Olicaca wrote:

> Hi every one.
> I'm trying to find some program help me in the security problems.
> What things i need for?It must be a program that help me control all
> hidden executive and installation.


Wouldn't the first step be stop abusing MSIE as a webbrowser?

> I need it help me to monitor and

> report me if a program is being installed to my system


Huh? Unless you explicitly do that, this can't happen.

> help me monitor all of its activities(creat files,del files,add value to

> registry,modified files)


You mean something like Procmon? But this poses a huge performance impact on
the system, but no real security benefit.

> and i can stop any action of its installation at anytime i want.


Oh, that's trivial. Just take Process Explorer and suspend the relevant
process (which actually just suspends all non-suspended threads). But how is
this related to security?

> And i want it log every thing of that to a log file
> so that i can view after if it's a malware.


Huh? It's not like some malware would present itself like this. After all,
shouldn't you focus on not running the malware in first place?

> And the second i need is a folder and files security program.I need a
> program can help me control the folder access permission of the
> system.


You mean what Windows already does?

> For the second purpose,i did try the Universal Shield


Looks like scamware.

> but it not work excellently as my mine,now i'm still looking for these.


So what was your problem? Do you want a program that helps you managing the
ACLs in Windows more efficiently? Or what?

> Anyone have the experience please help me,just give me the name of
> them.I will thank very much!

Kayman
04-09-08, 07:34 PM
On Wed, 9 Apr 2008 10:06:25 -0700 (PDT), Olicaca wrote:

> Hi every one.
> I'm trying to find some program help me in the security problems.

<snipped for brevity>

Assuming you're on Win XP Pro SP2...
The most dependable defenses are:
1. Do not work as 'Administrator'; For day-to-day work routinely use a
Limited User Account (LUA).
2. Secure (Harden) your operating system.
3. Keep your operating (OS) system (and all software on it)
updated/patched.
4. Reconsider the usage of IE and OE.
5. Review your installed 3rd party software applications/utilities;
Remove clutter.
6. Don't expose services to public networks.
7. Activate the build-in firewall and configure Windows not to use
TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
networking weak point) closed.
7a.If on high-speed internet use a router as well.
8. Routinely practice safe-hex.
9. Regularly back-up data/files.
10.Familiarize yourself with crash recovery tools and re-installing your
operating system (OS).
11.Utilize a real-time anti-virus application and vital system
monitoring utilities/applications.
12.Keep abreast of the latest developments - ***** happens...you know.

The least preferred defenses are:
Myriads of popular anti-whatever applications and staying ignorant.
--
Security is a process not a product.
(Bruce Schneier)

Todd H.
04-09-08, 11:38 PM
Kayman <kaymanDeleteThis@operamail.com> writes:

> On Wed, 9 Apr 2008 10:06:25 -0700 (PDT), Olicaca wrote:
>
>> Hi every one.
>> I'm trying to find some program help me in the security problems.
>
> <snipped for brevity>
>
> Assuming you're on Win XP Pro SP2...
> The most dependable defenses are:
> 1. Do not work as 'Administrator'; For day-to-day work routinely use a
> Limited User Account (LUA).


I actually broke down and tried this once with a user in the house
here on one machine that stays up all the time with one user (not me).

My experience was that it actually decreased security because the pain
in the ass it made in applying software updates to non-microsoft
software (Quicktime patch of the week, instant messenger software
updates, Mozilla products) actually caused the overall posture to be
less secure because the tedium of having to log out, log in as
administrator and apply the updates left the machine unpatched longer
just because the pain it'd become.


Nice in theory, pain in the butt and backfires in practice for many
situations, I suspect.


--
Todd H.
http://www.toddh.net/

Kayman
04-10-08, 02:34 AM
On Wed, 09 Apr 2008 23:38:47 -0500, Todd H. wrote:

> Kayman <kaymanDeleteThis@operamail.com> writes:
>
>> On Wed, 9 Apr 2008 10:06:25 -0700 (PDT), Olicaca wrote:
>>
>>> Hi every one.
>>> I'm trying to find some program help me in the security problems.
>>
>> <snipped for brevity>
>>
>> Assuming you're on Win XP Pro SP2...
>> The most dependable defenses are:
>> 1. Do not work as 'Administrator'; For day-to-day work routinely use a
>> Limited User Account (LUA).
>
>
> I actually broke down and tried this once with a user in the house
> here on one machine that stays up all the time with one user (not me).
>
> My experience was that it actually decreased security because the pain
> in the ass it made in applying software updates to non-microsoft
> software (Quicktime patch of the week, instant messenger software
> updates, Mozilla products) actually caused the overall posture to be
> less secure because the tedium of having to log out, log in as
> administrator and apply the updates left the machine unpatched longer
> just because the pain it'd become.
>
>
> Nice in theory, pain in the butt and backfires in practice for many
> situations, I suspect.

Well, we all have our different experiences and browsing habits. I work in
LUA all the time without any problems and work with the admin acc usually
once a month (mainly for updating software apps and/or other maintenance
purposes). I admit that working in LUA can be tricky at first for the
uninitiated but in my experience, the learning curve flattens over time.
How the right user account can help your computer security.
http://www.microsoft.com/protect/computer/advanced/useraccount.mspx
Aaron Margosis' "Non-Admin" WebLog
http://blogs.msdn.com/aaron_margosis/pages/TOC.aspx
The easiest way to run as non-admin.
http://blogs.msdn.com/aaron_margosis/archive/2004/06/17/158806.aspx
http://blogs.msdn.com/aaron_margosis/

Olicaca
04-10-08, 06:34 AM
On Apr 10, 1:14*am, "Sebastian G." <se...@seppig.de> wrote:

Wouldn't the first step be stop abusing MSIE as a webbrowser?
Huh? Unless you explicitly do that, this can't happen.
You mean something like Procmon? But this poses a huge performance
impact on
the system, but no real security benefit.
Oh, that's trivial. Just take Process Explorer and suspend the
relevant
process (which actually just suspends all non-suspended threads). But
how is
this related to security?

Huh? It's not like some malware would present itself like this. After
all,
shouldn't you focus on not running the malware in first place?

You mean what Windows already does?

Looks like scamware.

So what was your problem? Do you want a program that helps you
managing the
ACLs in Windows more efficiently? Or what?
-------------------------------------------
Sebastian,i don't understand really ur answer purpose here.I just ask
u some software u know,famous and useful and i don't underline about
my security problem here,i ask about the software and just the
software,don't care much about security knowlegde,so that let help
about software please(!),what program best and useful.Okie?
Ok,so i tell u more about my soft.
If you come a site and suddenly,a file down and install on ur
computer,so how do you
deal with?And if you install a file that bound with a virus,so beside
you install the soft,how do you know and treat with that malware?Some
month ago i get xorer virus from a CD-Rom(it is so unluck to me that
that time my antivirus not updated) and it inject to all exe
files....,after then i update and it del all my data.
Windows ACLs i know alitlle but as i know,if a folder write and delete
protected then no any program can write data to it,and if a folder can
be write by a program then virus can write to it.
Process Monitor i know but so slow down and not a installation monitor
tool ja,even i use it monitor my installation then i cannot control
anything aswell.Scamware i dont know.
Okie,so all your ever advice is not useful for me.Anyway thanks for
the care!(Ah,and what is "huh?" :D,my English not well ja,seemed u
often huh? on ur saying?? is that right?:D,just joke,ur style is
wonderful with me :D)


Kay,your knowlegde really nice,thank very much.But maybe i was
wrong,my problem seemed not really security,it just about some
tools.Anyway thanks!

Sebastian G.
04-10-08, 07:09 AM
Olicaca wrote:


> Sebastian,i don't understand really ur answer purpose here.I just ask
> u some software u know,


Would you please write in proper English, like in any other formal letter?

> famous and useful and i don't underline about

> my security problem here,i ask about the software and just the
> software,don't care much about security knowlegde,so that let help


Sorry that I dared for actually addressing your problem... Anyway, this is a
newsgroup, not a support forum. Don't expect your questions to be answered
or even the discussion leading to a point you'd like.

> about software please(!),what program best and useful.Okie?


Your system is compromised, so no software can't help you. D'Oh, that's trivial!

> If you come a site and suddenly,a file down and install on ur
> computer,so how do you deal with?


Turn off the computer, boot from an offline media, create a backup and then
start verifying against a well-known safe backup, signature base etc.,
consequently restoring any modification. Then I'd login as admin, create a
new user account and shift over all data. Then I start verifying them in the
background while rebuilding all settings and reinstalling all relevant
programs from trusted media.

What else?

> And if you install a file that bound with a virus,

I simply don't do this. Period.

> so beside you install the soft,how do you know and treat with that
> malware?

I guess I'd recognize the misbehaviour pretty soon, and start investigating it.

> Some

> month ago i get xorer virus from a CD-Rom(it is so unluck to me that
> that time my antivirus not updated)


Even if it was, that generally wouldn't have stopped it.

> Windows ACLs i know alitlle but as i know,if a folder write and delete
> protected


That is, the effective write access of the user to the folder is denied.
That's what you mean? Since there's some scenarios where other permissions
might allow write access as well (f.e. being the owner, being able to change
the ACLs, delete child permissions on the upper folder).

> then no any program can write data to it,and if a folder can
> be write by a program then virus can write to it.


Yes, trivially. The access is enforced by the kernel, and everything has to
pass trough it for accessing hardware resources (other than CPU and RAM).

> Process Monitor i know but so slow down and not a installation monitor
> tool ja,even i use it monitor my installation then i cannot control
> anything aswell.


You cannot control other than by ACLs and capabilities. If you give write
access somewhere, then the installation is free to write there. if you don't
want this, set proper permissions.

> Scamware i dont know.

You know, it is security software that tries to implement a broken concept
in a broken way, so actually reduces the security.

> Okie,so all your ever advice is not useful for me.


Well, this might be because you didn't ask the proper questions? From what
you wrote it seems like you didn't even flatten and rebuild the system.

ana
04-10-08, 07:49 AM
On Apr 10, 5:09 pm, "Sebastian G." <se...@seppig.de> wrote:
> Olicaca wrote:
> > Sebastian,i don't understand really ur answer purpose here.I just ask
> > u some software u know,
>
> Would you please write in proper English, like in any other formal letter?
>
> > famous and useful and i don't underline about
>
> > my security problem here,i ask about the software and just the
> > software,don't care much about security knowlegde,so that let help
>
> Sorry that I dared for actually addressing your problem... Anyway, this is a
> newsgroup, not a support forum. Don't expect your questions to be answered
> or even the discussion leading to a point you'd like.
>
> > about software please(!),what program best and useful.Okie?
>
> Your system is compromised, so no software can't help you. D'Oh, that's trivial!
>
> > If you come a site and suddenly,a file down and install on ur
> > computer,so how do you deal with?
>
> Turn off the computer, boot from an offline media, create a backup and then
> start verifying against a well-known safe backup, signature base etc.,
> consequently restoring any modification. Then I'd login as admin, create a
> new user account and shift over all data. Then I start verifying them in the
> background while rebuilding all settings and reinstalling all relevant
> programs from trusted media.
>
> What else?
>
> > And if you install a file that bound with a virus,
>
> I simply don't do this. Period.
>
> > so beside you install the soft,how do you know and treat with that
> > malware?
>
> I guess I'd recognize the misbehaviour pretty soon, and start investigating it.
>
> > Some
>
> > month ago i get xorer virus from a CD-Rom(it is so unluck to me that
> > that time my antivirus not updated)
>
> Even if it was, that generally wouldn't have stopped it.
>
> > Windows ACLs i know alitlle but as i know,if a folder write and delete
> > protected
>
> That is, the effective write access of the user to the folder is denied.
> That's what you mean? Since there's some scenarios where other permissions
> might allow write access as well (f.e. being the owner, being able to change
> the ACLs, delete child permissions on the upper folder).
>
> > then no any program can write data to it,and if a folder can
> > be write by a program then virus can write to it.
>
> Yes, trivially. The access is enforced by the kernel, and everything has to
> pass trough it for accessing hardware resources (other than CPU and RAM).
>
> > Process Monitor i know but so slow down and not a installation monitor
> > tool ja,even i use it monitor my installation then i cannot control
> > anything aswell.
>
> You cannot control other than by ACLs and capabilities. If you give write
> access somewhere, then the installation is free to write there. if you don't
> want this, set proper permissions.
>
> > Scamware i dont know.
>
> You know, it is security software that tries to implement a broken concept
> in a broken way, so actually reduces the security.
>
> > Okie,so all your ever advice is not useful for me.
>
> Well, this might be because you didn't ask the proper questions? From what
> you wrote it seems like you didn't even flatten and rebuild the system.

You can try Secure Auditor, a new software for unified digital risk
management issues. It contain 30 embedded security tools along with
event log viewers. May be it works for you. Download it from

http://www.download.com/Secure-Auditor/3000-2653-10826743.html?part=dl-SecureAud&subj=uo&tag=button

Olicaca
04-10-08, 08:01 AM
Ok Sebastian,so follow u,where should i put this question to,so that
everyone will help me?I just have join Google group for a month ja,and
i just think Google group is opened for all men and women,post the
question and will there be some one come and help,i don't know that
Google group have the law aswell.Sorry that.Just needing protect my
data and i post here...
A private question Sebastian,which national language sebastian belong
to? Spainish? (just not yet hear any English name so that before
ja)Sorry ,if u don't want then don't need answer :).
--------------------------------------------
On Apr 10, 7:09*pm, "Sebastian G." <se...@seppig.de> wrote:
> Olicaca wrote:
> > Sebastian,i don't understand really ur answer purpose here.I just ask
> > u some software u know,
>
> Would you please write in proper English, like in any other formal letter?
>
> *> famous and useful and i don't underline about
>
> > my security problem here,i ask about the software and just the
> > software,don't care much about security knowlegde,so that let help
>
> Sorry that I dared for actually addressing your problem... Anyway, this isa
> newsgroup, not a support forum. Don't expect your questions to be answered
> or even the discussion leading to a point you'd like.
>
> > about software please(!),what program best and useful.Okie?
>
> Your system is compromised, so no software can't help you. D'Oh, that's trivial!
>
> > If you come a site and suddenly,a file down and install on ur
> > computer,so how do you deal with?
>
> Turn off the computer, boot from an offline media, create a backup and then
> start verifying against a well-known safe backup, signature base etc.,
> consequently restoring any modification. Then I'd login as admin, create a
> new user account and shift over all data. Then I start verifying them in the
> background while rebuilding all settings and reinstalling all relevant
> programs from trusted media.
>
> What else?
>
> *> And if you install a file that bound with a virus,
>
> I simply don't do this. Period.
>
> *> so beside you install the soft,how do you know and treat with that
> *> malware?
>
> I guess I'd recognize the misbehaviour pretty soon, and start investigating it.
>
> *> Some
>
> > month ago i get xorer virus from a CD-Rom(it is so unluck to me that
> > that time my antivirus not updated)
>
> Even if it was, that generally wouldn't have stopped it.
>
> > Windows ACLs i know alitlle but as i know,if a folder write and delete
> > protected
>
> That is, the effective write access of the user to the folder is denied.
> That's what you mean? Since there's some scenarios where other permissions
> might allow write access as well (f.e. being the owner, being able to change
> the ACLs, delete child permissions on the upper folder).
>
> > then no any program can write data to it,and if a folder can
> > be write by a program then virus can write to it.
>
> Yes, trivially. The access is enforced by the kernel, and everything has to
> pass trough it for accessing hardware resources (other than CPU and RAM).
>
> > Process Monitor i know but so slow down and not a installation monitor
> > tool ja,even i use it monitor my installation then i cannot control
> > anything aswell.
>
> You cannot control other than by ACLs and capabilities. If you give write
> access somewhere, then the installation is free to write there. if you don't
> want this, set proper permissions.
>
> *> Scamware i dont know.
>
> You know, it is security software that tries to implement a broken concept
> in a broken way, so actually reduces the security.
>
> > Okie,so all your ever advice is not useful for me.
>
> Well, this might be because you didn't ask the proper questions? From what
> you wrote it seems like you didn't even flatten and rebuild the system.

Sebastian G.
04-10-08, 08:22 AM
Olicaca wrote:

> Ok Sebastian,so follow u,where should i put this question to,so that
> everyone will help me?


Maybe a webforum?

But I still wonder where your problem is. Flatten and rebuild the system,
then the system is recovered from the compromise. (Heck, in fact, if this
hasn't already been clear to you, then maybe you shouldn't dare
administrating a computer all by yourself.)

> I just have join Google group for a month ja,and
> i just think Google group is opened for all men and women,post the
> question and will there be some one come and help,


Wrong. Google Groups is merely a web interface for Usenet, and Usenet is a
media for *discussing news*. Discussions are different from simple support
stuff.

> i don't know that Google group have the law aswell.

Usenet follows both some agreed technical laws as well as many social laws.
One of these is that discussions won't generally lead your way, and not
answer your questions at all.

> Just needing protect my data and i post here...

Coming to think of it, don't you think that comp.security.*firewalls* might
be the wrong group?

Olicaca
04-10-08, 11:21 AM
On Apr 10, 7:49*pm, ana <Anatod...@gmail.com> wrote:
> On Apr 10, 5:09 pm, "Sebastian G." <se...@seppig.de> wrote:
>
>
>
>
>
> > Olicaca wrote:
> > > Sebastian,i don't understand really ur answer purpose here.I just ask
> > > u some software u know,
>
> > Would you please write in proper English, like in any other formal letter?
>
> > *> famous and useful and i don't underline about
>
> > > my security problem here,i ask about the software and just the
> > > software,don't care much about security knowlegde,so that let help
>
> > Sorry that I dared for actually addressing your problem... Anyway, this is a
> > newsgroup, not a support forum. Don't expect your questions to be answered
> > or even the discussion leading to a point you'd like.
>
> > > about software please(!),what program best and useful.Okie?
>
> > Your system is compromised, so no software can't help you. D'Oh, that's trivial!
>
> > > If you come a site and suddenly,a file down and install on ur
> > > computer,so how do you deal with?
>
> > Turn off the computer, boot from an offline media, create a backup and then
> > start verifying against a well-known safe backup, signature base etc.,
> > consequently restoring any modification. Then I'd login as admin, createa
> > new user account and shift over all data. Then I start verifying them inthe
> > background while rebuilding all settings and reinstalling all relevant
> > programs from trusted media.
>
> > What else?
>
> > *> And if you install a file that bound with a virus,
>
> > I simply don't do this. Period.
>
> > *> so beside you install the soft,how do you know and treat with that
> > *> malware?
>
> > I guess I'd recognize the misbehaviour pretty soon, and start investigating it.
>
> > *> Some
>
> > > month ago i get xorer virus from a CD-Rom(it is so unluck to me that
> > > that time my antivirus not updated)
>
> > Even if it was, that generally wouldn't have stopped it.
>
> > > Windows ACLs i know alitlle but as i know,if a folder write and delete
> > > protected
>
> > That is, the effective write access of the user to the folder is denied.
> > That's what you mean? Since there's some scenarios where other permissions
> > might allow write access as well (f.e. being the owner, being able to change
> > the ACLs, delete child permissions on the upper folder).
>
> > > then no any program can write data to it,and if a folder can
> > > be write by a program then virus can write to it.
>
> > Yes, trivially. The access is enforced by the kernel, and everything hasto
> > pass trough it for accessing hardware resources (other than CPU and RAM)..
>
> > > Process Monitor i know but so slow down and not a installation monitor
> > > tool ja,even i use it monitor my installation then i cannot control
> > > anything aswell.
>
> > You cannot control other than by ACLs and capabilities. If you give write
> > access somewhere, then the installation is free to write there. if you don't
> > want this, set proper permissions.
>
> > *> Scamware i dont know.
>
> > You know, it is security software that tries to implement a broken concept
> > in a broken way, so actually reduces the security.
>
> > > Okie,so all your ever advice is not useful for me.
>
> > Well, this might be because you didn't ask the proper questions? From what
> > you wrote it seems like you didn't even flatten and rebuild the system.
>
> You can try Secure Auditor, a new software for unified digital risk
> management issues. It contain 30 embedded security tools along with
> event log viewers. May be it works for you. Download it from
>
> http://www.download.com/Secure-Auditor/3000-2653-10826743.html?part=d...- Hide quoted text -
>
> - Show quoted text -

Anna,what is that,i see you post that to many group,could utell me
more?Is there the serial or it is freeware?

Sebastian G.
04-10-08, 11:27 AM
Olicaca wrote:


>> You can try Secure Auditor, a new software for unified digital risk
>> management issues. It contain 30 embedded security tools along with
>> event log viewers. May be it works for you. Download it from
>>
>> http://www.download.com/Secure-Auditor/3000-2653-10826743.html?part=d...- Hide quoted text -
>>
>> - Show quoted text -
>
> Anna,what is that,i see you post that to many group,could utell me
> more?Is there the serial or it is freeware?


It's spam.

DevilsPGD
04-10-08, 10:52 PM
In message <84hcea7294@news.giganews.com> comphelp@toddh.net (Todd H.)
wrote:

>I actually broke down and tried this once with a user in the house
>here on one machine that stays up all the time with one user (not me).
>
>My experience was that it actually decreased security because the pain
>in the ass it made in applying software updates to non-microsoft
>software (Quicktime patch of the week, instant messenger software
>updates, Mozilla products) actually caused the overall posture to be
>less secure because the tedium of having to log out, log in as
>administrator and apply the updates left the machine unpatched longer
>just because the pain it'd become.
>
>
>Nice in theory, pain in the butt and backfires in practice for many
>situations, I suspect.

One of the "perks" of Vista's UAC is that it solves this problem,
running as a limited user by default, but simplifying the process to
switch to administrative rights.

bz
04-11-08, 08:44 AM
DevilsPGD <spam_narf_spam@crazyhat.net> wrote in
news:ptntv3l5emat11ad3s617a2fds9m8vflnn@4ax.com:

> In message <84hcea7294@news.giganews.com> comphelp@toddh.net (Todd H.)
> wrote:
>
>>I actually broke down and tried this once with a user in the house
>>here on one machine that stays up all the time with one user (not me).
>>
>>My experience was that it actually decreased security because the pain
>>in the ass it made in applying software updates to non-microsoft
>>software (Quicktime patch of the week, instant messenger software
>>updates, Mozilla products) actually caused the overall posture to be
>>less secure because the tedium of having to log out, log in as
>>administrator and apply the updates left the machine unpatched longer
>>just because the pain it'd become.
>>
>>
>>Nice in theory, pain in the butt and backfires in practice for many
>>situations, I suspect.
>
> One of the "perks" of Vista's UAC is that it solves this problem,
> running as a limited user by default, but simplifying the process to
> switch to administrative rights.

and training the users to click on warning messages whenever they pop up.





--
bz

please pardon my infinite ignorance, the set-of-things-I-do-not-know is an
infinite set.

bz+csm@ch100-5.chem.lsu.edu remove ch100-5 to avoid spam trap

DevilsPGD
04-11-08, 10:22 AM
In message <Xns9A7D58E05CDDEWQAHBGMXSZHVspammote@130.39.198.139> bz
<bz+csm@ch100-5.chem.lsu.edu> wrote:

>and training the users to click on warning messages whenever they pop up.

Which only puts you back to where you were before UAC. However, for
those that pay even a minimal amount of attention and notice that they
did not initiate an action that required elevation, they may notice.

Honestly, if you're even seeing UAC popups daily once your systems are
up and running, I'd go as far as to say you're probably not an average
end user, or you're doing something wrong to begin with.

(Anyone who has even heard of usenet is probably not an end user. From
watching some audio reports, my kids haven't seen a UAC prompt in some
weeks, although I have been updating iTunes+Quicktime for them)

Arjun
04-12-08, 07:40 AM
On Apr 11, 7:22*pm, DevilsPGD <spam_narf_s...@crazyhat.net> wrote:
> In message <Xns9A7D58E05CDDEWQAHBGMXSZHVspamm...@130.39.198.139> bz
>
> <bz+...@ch100-5.chem.lsu.edu> wrote:
> >and training the users to click on warning messages whenever they pop up.
>
> Which only puts you back to where you were before UAC. *However, for
> those that pay even a minimal amount of attention and notice that they
> did not initiate an action that required elevation, they may notice.
>
> Honestly, if you're even seeing UAC popups daily once your systems are
> up and running, I'd go as far as to say you're probably not an average
> end user, or you're doing something wrong to begin with.
>
> (Anyone who has even heard of usenet is probably not an end user. *From
> watching some audio reports, my kids haven't seen a UAC prompt in some
> weeks, although I have been updating iTunes+Quicktime for them)

try kaspersky antivirus....should help u out in most of ur
requirements...

Sebastian G.
04-12-08, 08:01 AM
Arjun wrote:


> try kaspersky antivirus....should help u out in most of ur
> requirements...


Hm... didn't we discuss security? I fail to see how introducing an
additional security nightmare should help...

Sebastian G.
04-12-08, 08:03 AM
Arjun wrote:

> > try kaspersky antivirus....should help u out in most of ur
> > requirements...

Hm... didn't we discuss security? I fail to see how introducing an
additional security nightmare should help...

But well, quite typical for someone who even abuses MSIE as a webbrowser.
But even those guys are normally honest to themselves and don't dare
teaching others about security since they know that they're lacking competence.

DevilsPGD
04-12-08, 05:34 PM
In message
<a3291797-3fb1-4d9c-bb28-a2de3e4162d4@e67g2000hsa.googlegroups.com>
Arjun <arjunhegde@gmail.com> wrote:

>On Apr 11, 7:22*pm, DevilsPGD <spam_narf_s...@crazyhat.net> wrote:
>> In message <Xns9A7D58E05CDDEWQAHBGMXSZHVspamm...@130.39.198.139> bz
>>
>> <bz+...@ch100-5.chem.lsu.edu> wrote:
>> >and training the users to click on warning messages whenever they pop up.
>>
>> Which only puts you back to where you were before UAC. *However, for
>> those that pay even a minimal amount of attention and notice that they
>> did not initiate an action that required elevation, they may notice.
>>
>> Honestly, if you're even seeing UAC popups daily once your systems are
>> up and running, I'd go as far as to say you're probably not an average
>> end user, or you're doing something wrong to begin with.
>>
>> (Anyone who has even heard of usenet is probably not an end user. *From
>> watching some audio reports, my kids haven't seen a UAC prompt in some
>> weeks, although I have been updating iTunes+Quicktime for them)
>
>try kaspersky antivirus....should help u out in most of ur
>requirements...

How exactly will Kaspersky help me? Are you even reading this thread?

Arjun
04-13-08, 08:49 AM
On Apr 13, 2:34*am, DevilsPGD <spam_narf_s...@crazyhat.net> wrote:
> In message
> <a3291797-3fb1-4d9c-bb28-a2de3e416...@e67g2000hsa.googlegroups.com>
>
>
>
>
>
> Arjun <arjunhe...@gmail.com> wrote:
> >On Apr 11, 7:22*pm, DevilsPGD <spam_narf_s...@crazyhat.net> wrote:
> >> In message <Xns9A7D58E05CDDEWQAHBGMXSZHVspamm...@130.39.198.139> bz
>
> >> <bz+...@ch100-5.chem.lsu.edu> wrote:
> >> >and training the users to click on warning messages whenever they pop up.
>
> >> Which only puts you back to where you were before UAC. *However, for
> >> those that pay even a minimal amount of attention and notice that they
> >> did not initiate an action that required elevation, they may notice.
>
> >> Honestly, if you're even seeing UAC popups daily once your systems are
> >> up and running, I'd go as far as to say you're probably not an average
> >> end user, or you're doing something wrong to begin with.
>
> >> (Anyone who has even heard of usenet is probably not an end user. *From
> >> watching some audio reports, my kids haven't seen a UAC prompt in some
> >> weeks, although I have been updating iTunes+Quicktime for them)
>
> >try kaspersky antivirus....should help u out in most of ur
> >requirements...
>
> How exactly will Kaspersky help me? *Are you even reading this thread?- Hide quoted text -
>
> - Show quoted text -

kaspersky will prompt you every time a program is trying to access
registry and system files ......most of the time u can say no so that
non of the software is able to modify registry / use system file
area....this in turn will help you to be catious about any product
installation...(i suppose if u r knowing this much u also will be
knowing which program to allow n which not)....thses are some parts
which i meant to say that kaspersky could help.....

Sebastian G.
04-13-08, 10:20 AM
Arjun wrote:


> kaspersky will prompt you every time a program is trying to access
> registry and system files ......


Unless the program is malicious and simply answers these prompts itself.

> most of the time u can say no so that

> non of the software is able to modify registry / use system file
> area....


Wrong again. If it wants to, then it simply does by simply choosing other means.

At any rate, it looks like you're abusing MSIE as a webbrowser. And you want
to teach others about security? Laughable!

Arjun
04-14-08, 04:41 AM
On Apr 13, 7:20*pm, "Sebastian G." <se...@seppig.de> wrote:
> Arjun wrote:
> > kaspersky will prompt you every time a program is trying to access
> > registry and system files ......
>
> Unless the program is malicious and simply answers these prompts itself.
>
> *> most of the time u can say no so that
>
> > non of the software is able to modify registry / use system file
> > area....
>
> Wrong again. If it wants to, then it simply does by simply choosing other means.
>
> At any rate, it looks like you're abusing MSIE as a webbrowser. And you want
> to teach others about security? Laughable!

boss ....point is it does solve some of his problems....ur "other
means" will apply to any of the ideas u offer as well..........just
because u want vomit somthin don type in..... whether a suggestion
helps somebody or not is his own headache ......

now don vomit on this as well......i no what u r goin to do ....after
all its the gr8...