S
Shark
This is probably the most basic recommendation to secure your system.
Setup a limited user account for everyday activities and use an
Administrator account only for installing new trusted software. Linux
has always done this and Windows is slowly going that direction with
it's default configuration.
But how effective is a limited user account in preventing viruses
taking control of your system? Knowing a little about how permissions
work with NTFS, I can't figure how a virus could bypass this. Of
course there is a way because enterprises get viruses just as anybody
else (albeit not as often) and in a corporate environment limited user
accounts are exactly the norm. So how do viruses do it? If they don't
have write access to the registry, how do they make themselves
executable on system restarts?
I will only understand how protected I am if I understand what it
takes for a virus to circumvent this scheme. The worst security is
having the IMPRESSION you're secured...
Setup a limited user account for everyday activities and use an
Administrator account only for installing new trusted software. Linux
has always done this and Windows is slowly going that direction with
it's default configuration.
But how effective is a limited user account in preventing viruses
taking control of your system? Knowing a little about how permissions
work with NTFS, I can't figure how a virus could bypass this. Of
course there is a way because enterprises get viruses just as anybody
else (albeit not as often) and in a corporate environment limited user
accounts are exactly the norm. So how do viruses do it? If they don't
have write access to the registry, how do they make themselves
executable on system restarts?
I will only understand how protected I am if I understand what it
takes for a virus to circumvent this scheme. The worst security is
having the IMPRESSION you're secured...