Yep - I fully agree.  But when the customer requires this in an application - what else can you do?  Privelege escalation is a definite worry.  In my solution, I used named mutexs and encrypted memory mapped files using public/private key encryption via Windows CryptoAPI to trigger the installation.  A bit of of overkill in this case, but it was a good exercise.

Bob Arnson <[EMAIL PROTECTED]> wrote:
Jason Swager wrote:
> This approach has some drawbacks. First, the possibly extra service
> running all the time.
Which is a source of potential security holes, especially privilege
escalation as it's running 100 percent of the time as local system. It
works, but it's a sledgehammer of a solution.


--
sig://boB
http://bobs.org


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to