|
IIUC you only need the debug priv to debug processes started by another user. You can always debug processes that are running under your account. Giving a non-admin the debug priv is a security hole because that person could inject code into a system-level process and make it do something like run the Users control panel, and from there the person could add their account to the admins group. Last modified: 18hrs 12mins after originally posted --
|
|
|
|
|
Are you sure?
The ReadProcessMemory function states explicitly that the handle it uses must have PROCESS_VM_READ access. I don't know if PROCESS_VM_READ access is the same as Debug privileges or if PROCESS_VM_READ access requires Debug privileges but probably one of them is true since I have said in programming forums and such that the ReadProcessMemory function requires debug privileges and no one has said it is not true.
If it is true that any process that an account creates can use debugging functions on all other processes that the account creates then that is a security problem, since most users are not developers. If a non-developer executes a program that can access other processes then developers of the software would have access to data they should not have access to.
-- modified at 3:03 Saturday 10th March, 2007
|
|
|
|
|
You have complete permissions (Full Control) to any process you create.
You can inspect a process's access control list using Process Explorer[^]. Go to the process Properties, Security tab and click Permissions. If you then go to the Advanced editor (click Advanced) and Edit, you'll see all the permissions detailed, including Read Memory.
You only need the Debug privilege to debug processes that you didn't create (and therefore don't have permission in the process's access control list).
|
|
|
|
|
Is there a way to enumerate all the global shortcut keys that are, at a point of time, registered in the system?
|
|
|
|
|
I think there is but I don't remember the details. As best as I remember, the answer is obscure and not logical. My memory keeps telling me that it is a matter of enumerating global hooks in some way, but that could be wrong. I know it is not logical that they would be included as global hooks, but as I said, whatever the solution is, it is not logical.
|
|
|
|
|
I have configured a FTP server on our lab system using IIS6.0 on windows xp pro. I am able to connect to the server from any of our lab systems, but not able to connect to it from systems at home. Can someone help me on this? also I am using port 24 rather than standard 21.
-Pavan
|
|
|
|
|
There's probably a firewall in the way blocking you. This is something you'll have to take up with your company's IT department to allow you access to it from the outside world. Most companies I know wouldn't allow this because it's a monster of a secuirty risk and an FTP server exposed to the outside world is a great target for idiots to try and store their 'warez on a "free" FTP server.
Dave Kreskowiak
Microsoft MVP - Visual Basic
|
|
|
|
|
Hi,
I just bought a new system with 2 hard drives of 320GB each. after installing windows xp pro, it only recognizes 128GB of each one. does anyone else here know how to fix this?
Thank you!
kind regards,
I am a SysAdmin, I battle my own daemons.
|
|
|
|
|
See here[^].
To get setup to recognize disks of this size, you probably need an install CD with SP2 integrated.
|
|
|
|
|
SP2 solved my problem, thanks!... will rate once i get home
I am a SysAdmin, I battle my own daemons.
|
|
|
|
|
Check the disk management in your computer. Are there any unused partition in your system?
|
|
|
|
|
How do Trojen horses enter my mac using opn ports ?
My exact question is, i have an application which has an open port on which a socket is listning and accepting connectins but not accepting any further commands until he connection is authenticated, how is it that a virus has got through my appliction and enterd the system.
any help would be greatly appreciated.
DK
|
|
|
|
|
It didn't enter through that port, unless you used a well-known port that has a known security flaw. It more than likely got in using some other route.
Dave Kreskowiak
Microsoft MVP - Visual Basic
|
|
|
|
|
I also believe it is rather unlikely that someone would specifically target your application with a custom tailored worm, if that application is not that well known outside your company.
I'd like to clarify: If it is a trojan, that was recognized by an anti-virus software, it probably was not custom tailored. Additionally, trojans usually come hidden in another application.
Chances are that the malware was inside an application that someone downloaded from the web, and the LAN security level was not high enough to prevent it from spreading. Or - that always is a possibility - someone deliberately planted it there.
Cheers,
Sebastian
--
Contra vim mortem non est medicamen in hortem.
|
|
|
|
|
hi
i want to change bios setting from windows (any version).
can you help me?
thanks
|
|
|
|
|
AFAIK there are no standard APIs to do so, some, but not all bios vendors provide a proprietary tool to write a new bios from windows, but I've never seen anything that allows modifying values within. I'm almost certain what you want to do is impossible.
--
Rules of thumb should not be taken for the whole hand.
|
|
|
|
|
hi,
my speakers are working fine previously.But suddenly no sound is cominig?
Mine is windows 2000.
i have changes my mouse yesterday.
Plz give me a solution.
Thanks,
Vijaya.
|
|
|
|
|
Things to check:
Did you mute the sound? Check the mixer settings.
Did you unplug the speakers? Check all cabling from and to your speakers, including the power plugs.
If you are using a USB mouse and you are referring to USB-headphones: Are they still in the same USB-port? If not, you might have to reinstall the sound drivers.
Also: If you HAD USB-Headphones and have removed them to install a mouse, check that there is in fact a sound-card in your computer and that it is active.
Cheers,
Sebastian
--
Contra vim mortem non est medicamen in hortem.
|
|
|
|
|
Hi all,
I need to be able to automatically run a program of my choice, say an .exe or a VC++ program, when a particular USB device is plugged in. Does anyone know how to do it, or know where i can find more information about this topic?
any help is greatly appreciated!
thanks and regards,
Alvin
|
|
|
|
|
|
Hi.My question is how in Windows 2003 to create a user with this restrictions:
1.User cannot shutdown
2.user cannot use right click..
3.user cannot apply any administration at all..
Please help cause Im in desperate need..
Best regards
|
|
|
|
|
Hi
You can Use Active Dirctory For Section 1 & Some Of Section 3.
But About section 2,I don't Understand Wath you need.
Maybe You can Use a program to disable right-click.
Good Luck.
Mogtabam
|
|
|
|
|
Open the mmc (just type mmc in the run dialog box) click add the local policy. Also, once you create the user check what security groups the user is in and the permissions and rights of the user. On server 2003 it can be done the same just edit domain policy/GPO instead of local and disable logon local. Depending on how often your gpo updates you may want to run a GPupdate command in the command console. hope this helps.
|
|
|
|
|
Does anyone know if i need to run sysprep for vista if i am cloning with Symantec Ghost solution 2 ?
Planning deployement of 40 pc's all same hardware so I was thinkin sysprep would not be needed as hardware config all the same.
anyone with some knowledge on this would be appreciated
|
|
|
|
|
sysprep was traditionally needed in order to generate new system security identifiers. If you don't do this you can have problems with security on the network.
See here[^] for information on this problem.
|
|
|
|