-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Why not just move Cmd.exe to a different place. Most of these website attacks will go after the default place because that is where most users have it. I know it is security through obscurity but it makes another hurdle / layer / hoop for the attacker to jump through.
All the best, Leon - -----Original Message----- From: Curious George [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 12, 2002 12:59 PM To: [EMAIL PROTECTED] Subject: Restricting cmd.exe access This is a slight off shoot of the scary site post. What are the potential ramifications of restricting "system" access to cmd.exe? My thought is with all the MS exploits that are gaining access via some service running in the system context, this would be a great way to mitigate the potential impact. Thoughts? I am also thinking, ok this is going to inhibit using the scheduler service under the system account to run local batches, as well as any stored procedure in SQL that accesses the command shell, but services could be run in another context and still have access to the command shell... Am I way off with this? Will this break something that I am just not seeing? TIA Curious. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> iQA/AwUBPJDpddqAgf0xoaEuEQKXxwCgoNYByJMqDSapbmEoNjZC2Kv8ZzQAnRx5 yzSA1ULdq0m/p1hQW2iwyQPm =2H2Q -----END PGP SIGNATURE-----