lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jun 10 00:23:24 2006 From: feofil at gmail.com (Christian Swartzbaugh) Subject: Want to test this desktop barrier?, (Unauthorized offer) 0day protection Dan, Sure both methods will prevent many viri from taking over your computer, but notice there is a major difference. You obviously have not used a limited account before because usually software developed for Windows will require some configuration or settings change in order to correctly function under a limited account, with a few notable exceptions. This instead claims to create a sandbox where the functionality of an Administrator account is preserved without the harmful effects by using a virtual type of environment that is separate. I haven't used the software, but from the summary, that seems to be what was intended. Correct me if otherwise. feofil On 6/8/06, Dan Renner <dan@...angelescomputerhelp.com> wrote: > This is definitely has more luxury features, but couldn't you do pretty > much the same with MSDN's DROPMYRIGHTS program? > > It runs {whatever} program as a guest user, effectively dropping the > capabilities of that program to do nefarious things. > > ---------------------------------- > > Sincerely, > > Dan Renner > President > Los Angeles Computerhelp > http://losangelescomputerhelp.com > 818.352.8700
Powered by blists - more mailing lists