That's not a way "around" the security model any more than booting to a
DOS disk and running a program is, or installed a device driver.

Sorry to be so blunt, but anyone that downloads an unknown .exe to
his/her hard drive and runs it, is a fool.

In my more cynical moments, I've occasionally thought it would be
extremely useful if there were a rogue .exe/virus that actually did
reformat hard drives. It would force evolution of computer users, or at
least Darwinian survival policies. <g>

-- Brent Rector, .NET Wise Owl
Demeanor for .NET - an obfuscation utility
http://www.wiseowl.com/Products/Products.aspx



-----Original Message-----
From: franklin gray [mailto:[EMAIL PROTECTED]] 
Sent: Friday, May 31, 2002 8:49 AM
To: [EMAIL PROTECTED]
Subject: Re: [DOTNET] Strongly named assemblies require Full Trust ???


Oh yeah :-)

The funny thing is...there is a way around all this stuff.  Create an
Exe and download it to the machine, then run it.  Have that Exe call a
Web Service that returns a byte array(s) which is my dll(s) and exe.
Then save the array(s) as a file(s) on the harddrive, then kick of the
new exe.  This will by-pass all that security stuff.  So, in a way, the
security patch doesn't work....just makes it harder for us to do what we
want and puts the pressure on the user to know what he is doing when he
runs an Exe that he downloaded.

You can read messages from the DOTNET archive, unsubscribe from DOTNET, or
subscribe to other DevelopMentor lists at http://discuss.develop.com.

Reply via email to