Some software installers still ask if I want to install for all users, which require elevated permissions, or only for me, which don’t. In that last option it will not prompt for elevated permissions as it will use one of my user’s folders which I have already all permissions for, obviously.
It’s a security measure that’s half assed. People are so used to it they just click allow but don’t actually look at the prompt anymore. Like I see a lot of people do with cookies on websites.
Thats a windows thing so it can put files in “protected” folders like program files
The unfortunate thing about the UAC prompt is that it gives the software permission to put files in protected folders, but it also gives the software root permission so it can do literally anything else without prompting the user. Except, I believe, if it tries to install unsigned kernel drivers, then the user has to click a new prompt… but you can completely compromise a machine with the permissions that users routinely give to executables that they download from the Internet.
MonkderVierte@lemmy.zip 1 day ago
What’s with this anyway? A remnant from the single-user days?
InFerNo@lemmy.ml 21 hours ago
Some software installers still ask if I want to install for all users, which require elevated permissions, or only for me, which don’t. In that last option it will not prompt for elevated permissions as it will use one of my user’s folders which I have already all permissions for, obviously.
It’s a security measure that’s half assed. People are so used to it they just click allow but don’t actually look at the prompt anymore. Like I see a lot of people do with cookies on websites.
FauxLiving@lemmy.world 1 hour ago
The unfortunate thing about the UAC prompt is that it gives the software permission to put files in protected folders, but it also gives the software root permission so it can do literally anything else without prompting the user. Except, I believe, if it tries to install unsigned kernel drivers, then the user has to click a new prompt… but you can completely compromise a machine with the permissions that users routinely give to executables that they download from the Internet.