Its hard for non technical people to understand that. Most of the hobbyists here who get answers from google or mac blogs won't be able to understand it.
Some people on here might understand and appreciate receiving your guidance.
Its hard for non technical people to understand that. Most of the hobbyists here who get answers from google or mac blogs won't be able to understand it.
Some people on here might understand and appreciate receiving your guidance. So, give it a shot superhero!
Difference is my business cards say my title and I get paid to do it.
Kind of like our Microsoft Sharepoint Administrators say the same.
Why are there still people here stating Windows has better security features than OS X? This is truly not the case.
A house in the worst neighborhood (Windows) with more locks on the doors and bars on the windows, I suppose, has better "security" than some of my friends who live in the suburbs (Mac) and always have their doors unlocked. Reality is, the house in the worst neighborhood still gets attacked far more often.
Enough with the nonsense. I'm betting NUMEROUS MR readers visit sites they wouldn't admit to and STILL haven't caught anything.
Trojans are a problem, but on Mac, they still require an admin username and password to be entered before installing. On Windows 7ista, a simple "Allow" will install it.
And lastly, as someone else pointed out, as of 10.5, Mac OS X is Unix. It's not Unix-like, or Unix-based, or Unix-wannabe, or a flavor of Linux. It's officially, 100% Unix.
A script in a virus can authorize "OK". It can't guess your password.
Google it.
See above. Without crossover cable, Mac OSX wouldn't of fell.
User Account Control without a password could be easily defeated. By default Windows UAC has no password. OSX authorization require password by default.
Wrong! Linux didn't fall. Hasn't for two years. Linux does some things better than OSX. But, after a little reading, OSX wouldn't have fell without a crossover cable due to a 3rd party software/flash exploit because the flash exploit requires remote access of the system which is the loophole the crossover cable circumvented to get past ipfw.
You have that wrong.
The UAC "OK?" prompt comes from a different process, and will only
accept an [OK] from the keyboard/mouse.
That's integral to the UAC concept - the process requesting the OK
cannot grant itself the OK. It must receive the OK from a trusted
system process.
Conficker
That was so halarious. The world was in panic mode waiting for the "ultimate payload" to release all over the interwebz and disable the world haha.
By the way, I had to restore two windows vista systems last week where the kneber virus/worm completely decimated the standard user account and easily circumvented User Account Control by spoofing a windows update screen. It used Windows Live Messenger to access the system.
Is that new to windows 7? I did not know that. How come the Kneber worm is still ruining standard user accounts (at least in vista). I had to rebuild the account from the admin account as every piece of user software would not run? The antivirus program even detected it as it was entering the system but it could stop it.
Yes, post screen shots. Because this does not happen on my machines. Any of them. The dialog box allows me to postpone the reminder. Up to 4 hours. There is no auto restart. The box just sits there waiting for me to select postpone or restart.
So because it doesn't happen on your machines then it must not happen on anyone's?
![]()
If you ignore that dialog, your machine goes down. If your focused on your work, in an app that's taking up the entire screen (like a game), you'll lose whatever you've been doing.
Here's the article where I got the screen shot from
http://blogs.technet.com/mu/archive/2008/10/02/windows-update-and-automatic-reboots.aspx
Microsoft likes anyone who uses their crap to put "Microsoft" (or better yet, "Microsoft MVP") in their job title. It's all part of the plan.
By the way, I had to restore two windows vista systems last week where the kneber virus/worm completely decimated the standard user account and easily circumvented User Account Control by spoofing a windows update screen. It used Windows Live Messenger to access the system.
I don't know why you felt the need to post it again, but again, it's irrelevant. Hacked is hacked. It's just simulating a network environment.
I don't know why you felt the need to post it again, but again, it's irrelevant. Hacked is hacked. It's just simulating a network environment.
password is stored on your system in the keychain. I imagine if a script can hit ok it can also dig up your password. But remember, you have to execute a virus. If that's the case there is no hope for you.
Why are you letting your users login to admin accounts by default?
This sounds like a systems administrator error, not a Windows
problem.
MS doesn't pay them though.
You aren't paid by Apple. The sig incorrectly implies (whether you agree or not) that you are an Apple employee and it gives that impression on this forum. It's deceptive, and you probably know it.
MS doesn't pay them though.
They don't! I do to fix their computers when their standard user accounts are fried by KNEBER.
Go ahead and ignore the more important part of my comment.
I have yet to read anywhere about a crossover cable. Even if so, the rules would apply to all machines. And still windows/linux did not fall on day 2 like OSX did.Crossover cable is not real world as in across the web.
Windows is set to autorun by default. Mac does not. That is how viruses are started by autorun.
OSX admin password is stored securely and not accessible via "Keychain Access". If it was there would be more mac and linux viruses. Linux uses the keychain access model developed by apple and released open source.
Interesting ASLR has been compromised. I guess the next step for Windows is ipfw in the system by default.
ASLR can be good thats what helps keeps linux safe along with many other things. Linux just does it better than windows.
I have yet to read anywhere about a crossover cable. Even if so, the rules would apply to all machines. And still windows/linux did not fall on day 2 like OSX did.
There are apps set to run on startup on OSX. Though viruses get launched by the user running them. Then once installed they can startup automatically but they need the user to first install them.
It's possible to get your secured OSX admin password. It is on your system. Even "secured" it's easy to grab. I think it was num nums who earlier said how to get it.
As far as ASLR how does linux do it better than windows? We know that it's not in leopard and SL only has a partial implementation of it. How is linux better?
That is not the screen I get.
I've never seen that screen. Ever. Not once. Running 7 since it was in beta.
This is the screen I get:
![]()
That article is also from 2008 and refers to vista, not 7.