Home » Community » Coffee corner » Are they serious with this 'security' in Win7?
|
Re: Are they serious with this 'security' in Win7? [message #30697 is a reply to message #30667] |
Mon, 17 January 2011 16:05 |
Mindtraveller
Messages: 917 Registered: August 2007 Location: Russia, Moscow rgn.
|
Experienced Contributor |
|
|
There are a number of things which may be considered strange.
Many internal Win7 utilities such as firewall may be considered ineffective or badly designed, or even harmful. And I agree with it.
But still Win7 itself is rather good-working, effective and stable OS (I do try stressing it heavily for a number of months already - and it is certainly more stable than even XP SP2/3). More important is that Windows platform is the most common one in a number of areas.
By the way, that is how M$ explains installer detection process:
http://technet.microsoft.com/en-us/library/dd835540%28WS.10% 29.aspx
Quote: | Installer detection only applies to:
* 32-bit executable files.
* Applications without a requested execution level attribute.
* Interactive processes running as a standard user with UAC enabled.
Before a 32-bit process is created, the following attributes are checked to determine whether it is an installer:
* The file name includes keywords such as "install," "setup," or "update."
* Versioning Resource fields contain the following keywords: Vendor, Company Name, Product Name, File Description, Original Filename, Internal Name, and Export Name.
* Keywords in the side-by-side manifest are embedded in the executable file.
* Keywords in specific StringTable entries are linked in the executable file.
* Key attributes in the resource script data are linked in the executable file.
* There are targeted sequences of bytes within the executable file.
|
[Updated on: Mon, 17 January 2011 16:27] Report message to a moderator
|
|
|
|
Goto Forum:
Current Time: Fri Mar 29 03:17:11 CET 2024
Total time taken to generate the page: 0.01299 seconds
|