ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > General Software Discussion

NortonUAC

<< < (2/2)

MrCrispy:
Well the idea behind UAC is that it should only be seen in exceptional circumstances and not frequently. Unfortunately that is not the case with both Windows and many 3rd party apps because they are not well written (things like writing to files in system directories instead of user data), but they have been improving and no. of UAC prompts has gone down. Windows 7 will make UAC better. This blog has details -

http://blogs.msdn.com/e7/archive/2008/10/08/user-account-control.aspx

The trouble with Whitelisting is if you make a mistake (and its easy since most users don't understand technical prompts, they just want to get rid of them, which is part of the problem with UAC to begin with) it can be very dangerous. Imagine if a malicious app managed to fake a UAC prompt and you whitelist it.



f0dder:
This is an incredibly bad idea.

The point of UAC isn't just to keep malicious programs from doing bad things - it's just as important to keep trusted programs from doing bad things. Imagine the havoc that could happen if you add explorer.exe to the whitelist...

And even the idea of whitelisting something like UAC is, by itself, bad. I wonder how long it'll take before somebody manages to exploit NortonUAC and add itself to the whitelist.

What should instead have been done would be to keep the user elevated for a configurable time period after saying yes to an UAC prompt, that would make life easier when messing around with the control panel etc. For other stuff, imho UAC isn't really a big bother.

ClausValca:
When I was checking out my RSS feeds I happened to see that Paul Thurrott also blogged about this on his WinSuperSite.

In the comments were links provided by a Chinese Windows researcher by the name of Asuka. He referred to two posts that provides some background on what Norton's appears to be doing to fuzz the UAC system.

I'm linking to the Google-Translate version pages. However it still leaves a bit of the technicals "lost in translation" if you will.

Norton UAC Tool theory analysis - Asuka's Blog

Vampire in mind: an in-depth realization of the principle Norton UAC Tool - Smallfrog's Technical Blog.

There is enough there to get the gist of it, and possibly one could replicate their results to figure it out on your own.

I'm no coder, but do use ProcessMonitor/ProcessExplorer heavily in my sysadmin work dealing with malware and buggy applications so I was impressed with their findings. 

I personally have UAC engaged in "quiet mode" with the TweakUAC utility and actually like the blend of flexibility/protection it provides.  I'm not sure how I feel about this Norton's one.  I like it in theory, but am a bit more hesitant to deploy on my system.  Maybe as its method gets picked apart more by the security and coding community I might be more open to it.

It leaves me wondering now if Norton's can pull off this method of UAC interaction, what else could.

Certainly curious stuff.

Thought the "DonationCoder" community would find those deeper looks into the program's function interesting.

--Cheers!

aruvam:
One caveat - the application defaults to sending information to Norton about what caused the prompt and what your response to it was. See link for more details http://www.betanews.com/article/New_Norton_Vista_tool_trades_UAC_for_online_feedback/1223668881

justice:
So did anyone try it?

Navigation

[0] Message Index

[*] Previous page

Go to full version