lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <F9C0B32C4FFE7147BD0FF6A40BE806E701AE04@Hammer_Exchange.hammerofgod.com>
Date: Fri, 11 Jan 2008 11:18:22 -0800
From: "Thor (Hammer of God)" <thor@...merofgod.com>
To: "Alexander Bochmann" <ab@...ts.gxis.de>,
	<bugtraq@...urityfocus.com>
Subject: RE: At long last -- Extra Outlooks!

Well, I've heard MSFT people speak of Outlook's ability to execute the
way scientists talk about how a bumble bee can fly. It does it, but they
don't really know how.

I won't begin to comment on the principles behind it - all I can tell
you is that it is what it is.

t  

> -----Original Message-----
> From: Alexander Bochmann [mailto:ab@...ts.gxis.de]
> Sent: Friday, January 11, 2008 9:42 AM
> To: bugtraq@...urityfocus.com
> Subject: Re: At long last -- Extra Outlooks!
> 
> ...on Thu, Jan 10, 2008 at 10:28:34PM -0800, Thor (Hammer of God)
> wrote:
> 
>  > it turns out, Outlook is doing nothing close to what I feared.
>  > Basically, the second instance sees that another Outlook window is
>  > running in the same interactive logon space, and when it starts, it
> just
>  > calls another popup in the previous Outlook space and then
> terminates
>  > itself (that's close enough, anyway). The good news is that there
is
> no
>  > "user hopping" or "boundary crossing" here.
> 
> Sounds comparable to what the Windows Explorer does when
> it is not expicitly set to run as a separate process (or
> started with the /separate switch).
> 
> Is there some design principle behind this kind of behaviour?
> 
> Alex.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ