Botnet threat fiction?

Discussion in 'Windows Vista Security' started by DAS WULF, Aug 18, 2008.

  1. DAS WULF

    DAS WULF Guest

    I found this bot net security risk to be of interest. Does anyone have
    any knowledge if this is a threat one should be concerned with? As a
    precaution i have downloaded trend micro's rubotted beta program.
     
    DAS WULF, Aug 18, 2008
    #1
    1. Advertisements

  2. DAS WULF

    Mr. Arnold Guest

    What are you talking about?
     
    Mr. Arnold, Aug 18, 2008
    #2
    1. Advertisements

  3. DAS WULF

    DAS WULF Guest

    DAS WULF, Aug 18, 2008
    #3
  4. DAS WULF

    Mr. Arnold Guest

    Yeah, well you're right. US suffers are unaware of the botnet dangers as
    the surf the Internet with Windows machines with full Admin rights, and they
    don't know how to implement safe hex computing practices.

    I think UAC on Vista is trying to address some of the issues by not allowing
    the Admin user to run on the Internet with Full Admin rights, and the Admin
    is locked down to Standard user rights. If the Admin is on the Internet and
    something is happening that requires Full Admin rights, then the user is
    prompted to allow or disallow the action. If the user is a Standard user,
    then the user is prompted to give a user-id and psw to an Admin account to
    proceed. At least, something would be in their face forcing them take
    notice that something could be happening good or bad, if they recognize the
    situation.

    http://news.softpedia.com/news/Admin-Approval-Mode-in-Windows-Vista-45312.shtml
    http://technet.microsoft.com/en-us/library/cc709691.aspx

    It is not unlike a user running on Linux where the user is a Limited user or
    a user that's not an Admin with full rights, until such time the user is
    prompted to give the root user/admin user-id and psw before things will
    processed.

    UAC if enabled can help stop this kind of stuff from happening if the user
    recognizes the conditions as to why the user is being prompted.

    http://www.eweek.com/c/a/Security/Hundreds-Click-on-Click-Here-to-Get-Infected-Ad/
     
    Mr. Arnold, Aug 18, 2008
    #4
  5. DAS WULF

    Flight Guest

    There is a simple solution: all your traffic through a safe channel. Ever
    heard of OpenDNS? Visit opendns.com and read it. It saved me several times
    from attacks.
     
    Flight, Aug 19, 2008
    #5
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.