R.Wieser wrote on 2016/02/29:
> VanguardLH,
>
>> SumatraPDF is portable so you don't even install it, just copy
>> its file and run that.
>
> Now *thats* something I like. Yes, even if used stationary. "Un-install"
> a program ? Ha! Just delete the folder its in. Never understood MSes
> preoccupation with putting *everything* in the registry.
>
>> I also disable web browser integration in the config of the PDF
>> viewer so it does NOT display the .pdf inside the web browser
>> (by using a plug-in).
>
> Same here. If-and-when I want to view a PDF its quite likely I want to
> view it again. So, (after much deliberation) I first download and store it.
> Although on later browsers viewing PDFs locally might be, security wise,
> worse than viewing it in the sandboxes those browsers provide ...
I know a lot of folks like to bash Adobe Reader due to its past history
but that program has had a sandbox for quite awhile now. I forget the
option but you could make Adobe Reader more secure but you had to enable
some option under the "Security (Enhanced)" section (that is not enabled
by default probably to ensure widest usability). With enhanced security
(
http://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/Acrobat_Enhanced_Security_FAQ.pdf),
high-privilege Javascript is disable; however, you can completely
disable Javascript, too. I don't remember the default but make sure
under Security (Enhanced) that the "Automatically trust sites from my
Win OS security zone" (which means sites you whitelist in the Internet
Options' Trusted Sites security zone would have their PDFs trusted - but
bad PDFs or rude authors exist everywhere, including sites you trust).
Most times when someone nags about Adobe Reader being insecure, they
haven't even bothered to view the options available and investigate
them. They haven't gone into Security (Enhanced) to make sure it is
enabled, and also ensured Protected Mode is enabled (the sandbox you
mentioned but here instead of by a web browser). See
http://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/index.html. As
yet, I don't that anyone has proven Adobe Reader with both enhanced and
protected mode enabled and with disabling other features, like
Javascript, is any more insecure than other PDF readers. Yes, you can
find lists of open tickets against Adobe Reader. Have you EVER found a
bug tracking database that is publicly accessible for the other PDF
readers? You don't know how bad they are for vulnerabilities. That
info remains hidden. So you could be using a highly vulnerable
alternative PDF reader and your only blind hope is that it doesn't get
targeted because it isn't the big target.
The reason why some still nag about how big it is don't realize that it
has code to parse ancient PDFs (old versions of PDF specs). Most users
don't need to view PDFs that were created 2 decades ago but Adobe needs
to remain compatible with their old stuff. They could offer an install-
time option to let users discard support for specific old PDF versions
but that would require users be educated on what was different between
each PDF version. I suspect, besides momentum, that companies prefer to
have Adobe Reader on their workstations because group policies can be
pushed onto those workstations that control how Adobe Reader behaves,
like disabling its update checking. It is an enterprise-centric product
to control property that belongs to them, not the employees, whereas the
other are designed for personal use on computers that are the property
of the user.
Not sure how a sandbox would help if launch action, Javascript, and
attachments were disable (or not supported) in the PDF viewer. That
would be like claiming some guy with no testicles was the father of a
child. A program issuing a system call to a font API or ancilliary
program isn't going to pull it into the sandbox. You would need to use
a virtual machine to do that level of isolation; however, those who use
VMs to detect malware don't realize that many of those will remain
quiescent or behaved when they detect they are ran inside an VM. Worked
okay inside the VM so they install it in their real host OS and then the
malware becomes potent.
>> Do you know about SRPs (Software Restriction Policies)
>> that you can define in the registry using the Group Policy
>> Editor (gpedit.msc)?
>
> Ehrm ... I've heard of it, but never had, on my single-user computer, the
> need to use it. I have absolutily no idea how I would need to use it to
> reign a mal-behaving program in.
You would use a 3rd party firewall with HIPS to control unwanted
networking behavior for a program. SRPs are used to prevent the program
from even loading (Path rule set to Block) or to throttle its privileges
(Path rule set to Basic).
>
>> Back in Windows XP, you could only Allow or Block a
>> program from loading.
>
> Ehhh ... I hope you are aware that you're posting in a newsgroup
> dedicated to XP ? So whats that "back in XP" about ? I'm still
> using it ! :-)
Yes, I am responding in a WinXP group but that doesn't mean I use that
OS anymore. I also respond in the WLM (Windows Live Mail) newsgroup but
I only used that program for a few months awhile ago - because sometimes
the questions don't really involve the program but are about e-mail
itself.
SRPs have been available since Windows XP and that's where I first
learned about them. They are still available in later versions of
Windows to which I moved to awhile ago. Since I no longer have any
WinXP hosts at home or even at work, much of what I mention is from
memory or I have to go look it up again.
I did find an old Usenet post of mine that mentions the registry hack,
at:
https://groups.google.com/d/msg/microsoft.public.windowsxp.help_and_support/iFdHbt-Hf1k/mttUNl3kpXMJ
>> Before I knew about SRPs, I used 3rd party firewalls that had
>> HIPS (Host Intrustion Protection System) that let me block
>> unwanted programs from loading.
>
> I'm not sure I understand the above: Why block an unwanted program if you
> can (simply?) remove it ?
Don't know what to remove until you catch it. In the example that I
gave, I did NOT want to remove MagicJack because, at that time, I wanted
to use their VOIP service. I just did not want it automatically and
covertly updating until I was prepared (with an image backup) and had
the time and was ready for any behavior change in the new version of
their VOIP software.
So why not just rename or delete their setup.exe program? Because it
doesn't exist until they want to do an update. Not all programs come
with separate .exe files to perform setup, updates, or other functions.
Instead those "programs" are code tables inside the program that get
rolled out into files and then executed. So there was no setup.exe file
for me to rename or delete. However, because I knew where they created
the setup.exe into which they rolled out that code from the main
program, I could use an SRP Path rule to keep the generated setup.exe
from loading. You can also define hash rules to catch a program when
you don't know where it might be (in the future) but I never used that
feature.
> Oh shucks: You're talking about a multi-user environment, where the users
> have different privileges (admin, power-user, user, guest), and
> low-privilege users must/should/need to be stopped from using programs (like
> regedit) the high-privilege users might have need of.
Nope, I'm the only user of my home PC. I found logging in under a
restricted account too often got in my way, like not being able to edit
the registry, define SRPs (because all policies are registry entries),
or perform other admin-level tasks. I wasn't logging out or even using
FUS (Fast User Switching - which leaves programs running under the other
account). Do you ALWAYS close the bedroom door when you enter or leave?
Of course not because that would be too much nuisance.
However, I did not want all web-centric processes to have admin
privileges so I used SRPs to throttle them down using a LUA (limited
user access) token. There have been 3rd party programs to do the same
thing but some only work when a specific shortcut is used. For example,
I can throttle privileges on the specified program when using
SysInterna's psexec utility; however, that only applies limited
privileges to the program that *it* loaded. I could have it throttle
the web browser but that wouldn't help when the we browser was called as
a child process, like when clicking a hyperlink in an e-mail. SRPs get
applied to a program no matter who called it.
I do many tasks on my home PC that require admin privileges so logging
in under a restricted user account was not only a nuisance but not an
option since it would interfere way too often with my workflow. Do some
work, gotta stop to log under another account, do some tasks there, go
back to the other account to do more tasks. This would be like making
dinner involving heated cookware but having to use 2 different kitchens:
one with oven mitts and another without. No thanks.
> In my case I think that that does not really apply (but correct me if I'm
> wrong about that), as I'm the sole user of my 'puter.
I was the sole user, too, but SRPs (or HIPS in 3rd party security
software) gave me more control over rude or unwanted behavior without
necessitating removal of software that had other features that I did
want. I got more choice than I was given by default.
>> I used MagicJack (VOIP) awhile ago and it was nasty in
>> auto-updating itself without permission and even without
>> prompt.
>
> Yuck! That would be a program I would try to get rid of as fast as I
> could. Ofcourse, neccessity sometimes forces us to play the kind of doging
> game you described. But again, yuck! :-\
That's fine if you have the money for other telecommunication options.
it was very cheap. Cheaper than the old POTS telco, far cheaper than my
ISP's VOIP service, and even cheaper than a cell phone (although
Tracfone is very cost effective). Plus the VOIP call quality was better
than my cell phone so I would use it while at home instead of relying on
my cell phone.
Where can YOU find 5 years of phone service with better than cell phone
quality that would only cost $100 for those 5 years (or $20 for a WHOLE
year)? So, yeah, I managed to kill some unwanted features of their
client program (ads and covert auto-update) without losing the cheap
phone service. If you are using POTS, look at your monthly bill and
multiply by 12 to see how much you are spending on that. After all fee
and taxes, mine was $26/month (back then). That's $312/year. How much
are you spending for your cell phone service? Tracfone is cheap (but
with limited minutes) at $200 for 2 years at 1000 minutes. That would
be $500 for 5 years whereas Magicjack was $40 the 1st year and $20 each
year thereafter (by buying the $100 for 5 year plan). While I don't
have to go cheap, I also don't see the need to throw money away.
However, I eventually decided to pay a bit more for my ISP's VOIP
service and still do have a cell phone. Back then I didn't need a cell
phone but do now for business mostly; however, I keep calls to a minimum
and don't need any "data" (Internet) so Tracfone is a cheap choice. My
ISP's VOIP service is a shared cost. So I'm still going cheap (as much
as I can).
If you were so picky about not using and removing anything that had
behaviors that you don't want, why are you still using Windows? All
those tweaks you do for the OS and installing 3rd party program to
supplant those include with the OS is you having fun playing with the OS
to bend it more to how you want it. Same for me when I had MagicJack.
Just because it had some bad behaviors did not preclude me from pulling
in its reins to do it more my way.