Yes it does, try it.
Right click on an icon, go into advanced and tick run as administrator. Regards Dale Fraser http://dale.fraser.id.au/blog From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Andrew Scott Sent: Friday, 13 April 2007 5:31 PM To: [EMAIL PROTECTED] Subject: [cfaussie] Re: OT: Vista Application Ok now I am confused... Justin are you saying that if I deploy and application with Administrator privellages to run, it is going to ask me to Allow or Deny? On 4/13/07, Justin Carter <[EMAIL PROTECTED]> wrote: On Apr 13, 2:11 pm, "Dale Fraser" <[EMAIL PROTECTED] > wrote: > Trusted in what way? > > If I install my app into Program Files it can't do anything, including > writing files into subdirectories of the install path. > > If I install out side of Program Files it can do everything. > > So I think stuff in Program Files is less trusted, either i'm missing > something or they have not thought this through That's right, and that's how XP works. Anything can write anywhere it likes (NTFS permissions permitting). Vista aims to do things differently. Program Files is secured by UAC, meaning that if you want to change something, you have to give the process permission. If you install an app into Program Files you can trust that the app can't been infected/exploited by another non-admin process since requests for access are filtered through UAC, and when you run the app as Admin you should be able to trust it to do what it is supposed to do. If you install an app outside of Program Files it is open to a certain form of exploitation by a virus or other malicious user that can write to the files the application uses (purely because it is stored outside Program Files). If the application is compromised and you have it set up to run as Administrator, you are effectively giving the injected code a free ticket to ride, and since you already trust this particular app (in your own mind) you might be inclined allow privilege elevation whenever it requests it, when infact it could be some injected code doing it's dirty work under the guise of this other application. In your case Dale, if your app doesn't run as Admin when stored outside Program Files then there is considerably less risk that some other application which might always need to run as Administrator for whatever reason. But if your app did get compromised then some malicious injected code could be masquerading under the name of your app and will happily show the user a UAC prompt. Now what does the user do when "DalesApp01.exe" requests a privilege elevation? Will they be able to trust what will happen next? But the app is stored outside Program Files?! Arghhh! "To be continued..." :) Anyway, that's just my understanding of (part of) why the whole Program Files security stuff exists. That and the fact that we (mostly) all insist on using Admin accounts for every day use. But trust me, there is far less whinging and moaning with UAC than there would be if you weren't allowed to log on to the desktop with an Administrator account *at all*. IMO, the world would be in chaos and the internet would explode with "complaint overload" :P www.aegeon.com.au Phone: +613 8676 4223 Mobile: 0404 998 273 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "cfaussie" group. To post to this group, send email to [EMAIL PROTECTED] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/cfaussie?hl=en -~----------~----~----~----~------~----~------~--~---