It's my view that no person other than Admin should be allowed to install software on any computer where the day to day operation of the business relies on the system being up. Any deviation from that point degrades the possibility of the system remaining in an available state.
----- Original Message ----- From: "Claudine Robbins" <[EMAIL PROTECTED]> To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> Sent: Wednesday, June 25, 2003 9:58 AM Subject: [RBASE-L] - Re: Off Topic: AdAware > I'm following this thread with great interest as I'm sure everyone else > is. Would it help to set up users as 'restricted user' on WIN2K where > they can't install anything? > > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of MikeB > Sent: Wednesday, June 25, 2003 9:24 AM > To: RBASE-L Mailing List > Subject: [RBASE-L] - Re: Off Topic: AdAware > > These problems arise from the operators sense that their work computer > is "Their Computer" and they > feel it is OK to modify it or run software they see fit. In any > business environment, you risk > interruption of workflow and loss of profit from allowing this policy to > exist. You can enforce > what a person can do on their computer by becoming adept at Microsoft's > Policy application. It has > been a while since I used it, but on a Law Library in our county > courthouse, I used it to remove the > Run option from the start menu, disallow the creation of any Icons on > the desktop, File Deletion of > any kind, etc. It is quite powerful and extends backward all the way to > Win95. It can be set up > individually on a computer or set up on a server as Group Policies. > > Here is a looong Link [watch for wrap] to MSDN that has a number of > selections on this subject: > > http://search.microsoft.com/default.asp?qu=policy%20poledit&boolean=ALL& > so=RECCNT&p=1&nq=NEW&ig=03&ig=04&i=99&ig=05&i=99&ig=02&i=42&i=43&i=44&i= > 45&i=46&i=47&i=48&i=49&i=50&i=51&i=52&i=53&i=54&i=55&i=56&i=57&i=58&i=59 > &i=60&i=61&i=62&i=63&ig=07&i=99&ig=01&i=00&i=01&i=02&i=03&i=04&i=05&i=06 > &i=07&i=08&i=09&i=10&i=11&i=12&i=13&i=14&i=15&i=16&i=17&i=18&i=19&i=20&i > =21&i=22&i=23&i=24&i=25&i=26&i=27&i=28&i=29&i=30&i=31&i=32&i=33&i=34&i=3 > 5&i=36&i=37&i=38&i=39&i=40&i=41&i=99&siteid=us/dev > > > ----- Original Message ----- > From: "Dan Goldberg" <[EMAIL PROTECTED]> > To: "RBASE-L Mailing List" <[EMAIL PROTECTED]> > Sent: Wednesday, June 25, 2003 8:14 AM > Subject: [RBASE-L] - Re: Off Topic: AdAware > > > > > > I want to put in my five cents into this topic. > > > > I believe that ad-aware/spy-ware is more of a problem now > > than viruses. I have had three computers with strange > > problems. When I researched the problems I found they had > > ad-aware/spy-ware. > > > > One of my computers would not open explorer or internet > > explorer. It would try to open, get the "illegal operation" > > error, and close. It had a program called xupiter that was > > causing this. Even after removing the program from the > > add/remove programs menu it still was having problems. I had > > some instructions from the web on how to remove it manually > > from the registry and the system folder. That is what fixed > > it. > > > > Another computer had the hunter bar. It did not even have an > > uninstall!! > > > > A third computer had popups showing up with no windows > > open!! Everytime you would close a window another would show > > up. > > > > I am recommending to my people NOT to install "Free" > > programs from the web because of this growing problem. The > > price you pay for the "Free" program is getting pricey!! > > > > Dan Goldberg > > > > > > > > ----- Original Message Follows ----- > > > You are correct. I wanted to distinguish between benign > > > "cookies" ,peoples paranoia about them and actual > > > "executable programs" that you allow to be installed on > > > your computer. The Spyware within the context you > > > describe couldn't be installed on your computer through > > > Ordinary web activity. It just isn't possible. > > > > > > > > > > > > ----- Original Message ----- > > > From: Javier Valencia > > > <mailto:[EMAIL PROTECTED]> To: RBASE-L > > > Mailing List <mailto:[EMAIL PROTECTED]> Sent: Tuesday, > > > June 24, 2003 9:17 PM Subject: [RBASE-L] - Re: Off Topic: > > > AdAware > > > > > > Mike: > > > It is my understanding that all the so called "data > > > miners" indeed have access to your computer and can do > > > things such as keep track of sites you have visited, files > > > you have used, and in many cases your profile and personal > > > information as well. The information is periodically send > > > to the owners of the software who then sells this > > > demographic information and this is how you end up getting > > > e-mails from companies you never dealt with. In my opinion > > > , a gross and illegal invasion of privacy. > > > This mining software is hidden inside other software > > > (mostly freeware or shareware) such as screen savers, etc. > > > , which you download and agree to install in your computer > > > , what they do not tell you is that "data mining" software > > > is also installed in your computer without your permission > > > , again, in my opinion it constitutes fraud. These are > > > full-blown programs that install in your computer and you > > > need to go to the "remove software" at the control panel > > > to get rid of them. It is my understanding that this is > > > how shareware developers make money now a days as they get > > > paid by the "data mining" companies every time their > > > software gets downloaded. A couple of week ago, I run into > > > one of these programs that attaches itself to Google and > > > every time I did a search, it opened an extra page, > > > similar to Google but with different selected sites; the > > > only hint was the web site on the address bar. I contacted > > > Google and they indicated that they are tired of having to > > > deal with what they call parasite programs. I accessed the > > > web site on the address bar and the site has a description > > > of what their "data mining" software does and instructions > > > on how to remove it; as I indicated before, I had to go > > > through Control Panel>Add-remove Software> and I finally > > > got rid of it. It was a full- blown program that I never > > > agreed to have installed on my computer. Currently I use > > > AdShield to prevent pop-ups, Lavasoft weekly to get rid of > > > the above software, McAfee Virus Scan Online to prevent > > > viruses and Zone Alarm to prevent unwanted intrusions in > > > addition to the firewall on the router. It is a shame that > > > we have to have so much software cluttering or systems > > > just to prevent unwanted junk, but it is better to be safe > > > that sorry. Javier, > > > > > > Javier Valencia, PE > > > President > > > Valencia Technology Group, L.L.C. > > > 14315 S. Twilight Ln, Suite #14 > > > Olathe, Kansas 66962-4578 > > > Office (913)829-0888 > > > Fax (913)649-2904 > > > Cell (913)915-3137 > > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > > > Behalf Of MikeB Sent: Tuesday, June 24, 2003 5:02 PM > > > To: RBASE-L Mailing List > > > Subject: [RBASE-L] - Re: Off Topic: AdAware > > > > > > > > > http://www.spywareinfo.com/articles/spyware/ > > > <http://www.spywareinfo.com/articles/spyware/> > > > > > > You will see the harmful variety are installed as I stated > > > previously, as an activity of an executable that the user > > > agreed to install, such as the file sharing programs. The > > > Add variety that is within the security model of the > > > browser does not have any method to get at your email > > > lists or any other information on your machine. That is > > > the way the web is designed. > > > ----- Original Message ----- > > > > > > > > > From: Atrix Wolfe <mailto:[EMAIL PROTECTED]> > > > > > > To: RBASE-L Mailing <mailto:[EMAIL PROTECTED]> List > > > Sent: Tuesday, June 24, 2003 3:49 PM > > > Subject: [RBASE-L] - Re: Off Topic: AdAware > > > > > > Mike, > > > > > > it sounds to me like shes asking about spyware programs > > > actualy installed on her computer, not cookies or > > > javascript scripts. > > > > > > If so, spyware programs are still programs so they can do > > > what any other program can do, including scanning their > > > local network for whatever reason and reporting data to > > > some centralized server...or even more intrusive or > > > harmful things. Wouldnt you agree? > > > > > > ----- Original Message ----- > > > > > > > > > From: MikeB <mailto:[EMAIL PROTECTED]> > > > > > > To: RBASE-L Mailing <mailto:[EMAIL PROTECTED]> List > > > Sent: Tuesday, June 24, 2003 1:39 PM > > > Subject: [RBASE-L] - Re: Off Topic: AdAware > > > > > > absolutely not! The object model of ANY browser does not > > > allow for that type of activity to occur. There is no > > > reading or writing of any kind permitted by ANY browser. > > > The data that is stored can only be read from the domain > > > of the issuing cookie or by domains allowed in a third > > > party context where your internet activities are logged > > > whenever you visit cooperating sites for that particular > > > cookie (Gator or DoubleClick for example). The > > > accumulated data can be forwarded at any time by a > > > cooperating site. None of this data has anything to do > > > with any data on your computer whatsoever. It only > > > compiles a profile of your activities, so when you pop > > > into a commercial site, they can target you with a popup > > > ad or banner that more closely approximates your > > > particular tastes. That's All! Period. I do however, > > > feel that this is a bit intrusive for > > > my tastes and regularly run Ad-Aware on my machines > > > also..... > > > > > > ----- Original Message ----- > > > > > > > > > From: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> > > > > > > To: RBASE-L Mailing <mailto:[EMAIL PROTECTED]> List > > > Sent: Tuesday, June 24, 2003 1:37 PM > > > Subject: [RBASE-L] - Off Topic: AdAware > > > > > > > > > That client of mine who found all the spyware programs > > > says that she ran it again a week later and found 10 more. > > > She asks the following questions and I don't know the > > > answers. Do you? > > > > > > > > > "Can people go into my network and view my data with those > > > types of things? I noticed one recurring program called > > > "Dataminer". Someone told me that my firewall is not > > > working if those types of things get through. Is this > > > true? > > > > > > > > > Karen > > > > > > > > > > > > > > > > > > > --- RBASE-L > > ================================================ > > TO POST A MESSAGE TO ALL MEMBERS: > > Send a plain text email to [EMAIL PROTECTED] > > > > (Don't use any of these words as your Subject: > > INTRO, SUBSCRIBE, UNSUBSCRIBE, SEARCH, > > REMOVE, SUSPEND, RESUME, DIGEST, RESEND, HELP) > > ================================================ > > TO SEE MESSAGE POSTING GUIDELINES: > > Send a plain text email to [EMAIL PROTECTED] > > In the message SUBJECT, put just one word: INTRO > > ================================================ > > TO UNSUBSCRIBE: > > Send a plain text email to [EMAIL PROTECTED] > > In the message SUBJECT, put just one word: UNSUBSCRIBE > > ================================================ > > TO SEARCH ARCHIVES: > > Send a plain text email to [EMAIL PROTECTED] > > In the message SUBJECT, put just one word: SEARCH-n > > (where n is the number of days). In the message body, > > place any > > text to search for. > > ================================================ > > > > > >

