Psionicist
Explorer
Here's the thread: http://www.enworld.org/showthread.php?t=154665
IronWolf said:Unix based systems have had root kits for some time and they aren't asking permission to be installed.
Jonny Nexus said:Well I might be misunderstanding quite what a root kit is, but surely something that low-level would need admin level privilege to install?
(And if you're running in a standard user account, then you don't have admin level privilege - hell, on my Linux box I have to type in my admin password if I want to change the time).
Instead of admitting fault for installing a rootkit and installing it without proper disclosure, both Sony and First 4 Internet claim innocence. By not coming clean they are making clear to any potential customers that they are a not only technically incompetent, but also dishonest.
The First 4 Internet content protection technology is completely benign; it is not adware, it is not spyware, it is simply and plainly content protection. This content protection technology has not yet been introduced in Europe.
When users place the content protected discs in their computers, they must first click on an end user license agreement, known as a EULA, which informs the user that content protection software will be downloaded to their computer, and remain there until they choose to uninstall it.
I have been thinking that for a long time already. Fair Use is being eroded, and not too slowly either.Psionicist said:I am beginning to think the record and movie industry don't use DRM or copy protection "to keep honest people honest", I think they are trying to remove rights we already have and charge money for it (such as rewinding and timeshifting. Heck, they are already doing this: check out the TV-forum).
IronWolf said:While a root kit may need admin level privilege to install it can be trivial to get that. One, many, many windows users are running as local admin on their home PCs on a day to day basis. So that obstacle doesn't stand in the way for many folks. In addition one only needs to exploit a vulnerability in a local service running under a local system account and have full ability to access parts of your machine.
That's why the security patches MS releases are important to install. If a service that has a hole in it is running as 'Local System' it has full access to your machine. So if you can run code of you own choice by taking advantage of a service running that way then you can affectively do whatever you want to with that machine. Including installing a root kit.
Jonny Nexus said:Yes, but that's Windows. My understanding is that standard practice on Unix/Linux is to *not* run user accounts with admin privileges (something that is much easier to do than on Windows due to the more modular way in which the security is implemented).