VISTA VS. XP AND FORMATTING YOUR COMPUTER!

Posts

Pages: first prev 12 last
author=myersguy link=topic=3161.msg62057#msg62057 date=1234769208
Any idea where I could find some of these XP drivers? I doubt they would be on the company site, seeing how the laptop was made to run Vista (even though it shouldn't have been).

Can't you identify the hardware parts using Device Manager? From there it's just a case of searching for that brand's driver online.
I can read the hardware names, as long as I am running Vista. In XP, my videocard, for example, comes up as "Generic Video Device", or something to that effect.

If you are saying I should download all of the drivers while running xp, and then switch to XP and install them, then I ask again: Where could I get these drivers?
If all else fails, you could always go to each of the devices' manufacturer's websites and see if they have XP drivers you can get.
author=GreatRedSpirit link=topic=3161.msg62098#msg62098 date=1234804694
No. Confirming that an application needs admin privliges to continue is part of UAC. Auto accepting still gives the security benefits without the biggest issues people have with UAC (well, besides this performance issue I can't comment on)

Yes, but how does UAC confirm this raising of priveleges with the user? Through a UAC prompt. Auto-accepting all UAC prompts, in terms of security, is the same as disabling it altogether.

Unless you mean enabling only specific apps to bypass UAC, which is different.
Talking with tech support as we speak :D.

I bet I get shot down in flames.
author=GameOverGames Productions link=topic=3161.msg62139#msg62139 date=1234819344
If all else fails, you could always go to each of the devices' manufacturer's websites and see if they have XP drivers you can get.

This is what I suggested...baaaaaaaaaah
Well, I am going to have at it again. I found several complaint threads about this specific laptop and it's vista issues, and some of them had some drivers. What I know I have now are: 2 sets of drivers for video card, a set for sound, and a set for internet.

As far as I know, those were really the only problems I was having, so hopefully it now works.

The reason there are so many complaints is because, as it turns out, the original laptop (I guess mine is refurbished) only contains 512mb of ram. Thats right. They chose to run Vista on a single core celeron 1.6 with 512mb of ram. Idiots! I assume their decision was fueled by the crowd of people going "ooh, vista, I want to try that!".

Anyways, I will post again after formatting. For now, I think I will play some garrys mod first!
author=myersguy link=topic=3161.msg62190#msg62190 date=1234833209
Well, I am going to have at it again. I found several complaint threads about this specific laptop and it's vista issues, and some of them had some drivers. What I know I have now are: 2 sets of drivers for video card, a set for sound, and a set for internet.

As far as I know, those were really the only problems I was having, so hopefully it now works.

The reason there are so many complaints is because, as it turns out, the original laptop (I guess mine is refurbished) only contains 512mb of ram. Thats right. They chose to run Vista on a single core celeron 1.6 with 512mb of ram. Idiots! I assume their decision was fueled by the crowd of people going "ooh, vista, I want to try that!".

Anyways, I will post again after formatting. For now, I think I will play some garrys mod first!

If you have a Vista CD, you could try using vLite. If not, see if a friend has one, with the specific edition you have mind you. With any other edition besides the one you got, your product key will not work.
author=Atavus Dei link=topic=3161.msg62150#msg62150 date=1234823328
Yes, but how does UAC confirm this raising of priveleges with the user? Through a UAC prompt. Auto-accepting all UAC prompts, in terms of security, is the same as disabling it altogether.

Unless you mean enabling only specific apps to bypass UAC, which is different.

Auto accepting all UAC prompts is different than disabling it because the prompt is only part of the security measures that make up UAC. Auto accepting them does not disable all of the other security features which disabling the service would do.


Also Vista with 512MB of RAM is a terrible thing to do.
author=GreatRedSpirit link=topic=3161.msg62214#msg62214 date=1234838806
Auto accepting all UAC prompts is different than disabling it because the prompt is only part of the security measures that make up UAC. Auto accepting them does not disable all of the other security features which disabling the service would do.

You're assuming I'm speaking in literal terms. I am not. They are virtually similar to each other, as I will explain in two use-cases...

Microsoft's description of UAC: http://technet.microsoft.com/en-us/library/cc709691.aspx I'm not sure where you're getting at besides the fact that administrators do not get an administrator token on login. Which is passed through by the UAC prompts anyway on execution.

Situation 1: Program installation with the user's knowledge:

Imagine a user who has finished downloading a program, and that program contains embedded, hidden malicious software. The user does not know about this, however. He then runs the program, and the malicious software triggers UAC; however, because the UAC prompt was auto-accepted, the user realizes only too late that something in that program required core access to the system. When the program itself was only advertised to use functions that did not require administrator access. UAC might as well have been off at that point, because the malware now has a foothold in the unlucky victim's computer.

Situation 2: Program installation without the user's knowledge:

In this case, imagine another user visiting a website, and that website contained a destructive operating system attack of some kind (think Virtumonde and Smitfraud). The webpage launches code which auto-downloads some piece of malicious software onto the user's computer, and attempts to execute it without that user's knowledge; when it executes, it then triggers a UAC prompt. The UAC prompt is automatically accepted, however, and the malicious software is installed. The user knew that visiting websites on the Internet does not require administrator access, and would've otherwise clicked the Cancel button. However, because the prompt was auto-accepted, that user is now screwed with no way out.

My point is, auto accepting all UAC prompts is virtually similar to turning off UAC, because the prompt is all that bars something from executing and totalling a hapless user's computer. Why even bother having the prompts on, when you're just going to end up clicking OK all the time?
Success!!!

So, even after Gateway support told me it couldn't be done, I managed to pull off running XP. So far so good. Counter-Strike Source runs an average of 15-20FPS faster than before, and rather than idling at 50% ram usage, I now idle at about 8-12%.

YES, I AM FREE!
Situation 3: System compromised and IE is used to infect system

System gets compromised by a program that spawns a new IE process and use it to run code to get adware/viruses into protected areas of the system.

With UAC disabled: IE7 can do all this given the current user has sufficient access and it falls to hoping that the antivirus will catch this before it gets into the gears

With UAC enabled: IE7 will be in protected mode irregardless of current user access level and any attempt to write to a protected area is not allowed. No prompts are generated as being in protected mode IE7 shoots down any attempts at getting admin access right away.
author=myersguy link=topic=3161.msg62257#msg62257 date=1234844648
Gateway support


Gateway sucks. Gateway support :P
author=GreatRedSpirit link=topic=3161.msg62260#msg62260 date=1234844913
Situation 3: System compromised and IE is used to infect system

System gets compromised by a program that spawns a new IE process and use it to run code to get adware/viruses into protected areas of the system.

With UAC disabled: IE7 can do all this given the current user has sufficient access and it falls to hoping that the antivirus will catch this before it gets into the gears

With UAC enabled: IE7 will be in protected mode irregardless of current user access level and any attempt to write to a protected area is not allowed. No prompts are generated as being in protected mode IE7 shoots down any attempts at getting admin access right away.

That's one method out of many, many others, which an attacker could use to get bad things onto someone's computer. Not all malware goes through IE to run themselves.

Also, it's entirely possible to bypass this security measure anyway, as evidenced by the growing number of Vundo and Smitfraud infections out there. There's a new Deluxe Windows Antispyware 2010 coming out every other week, and they somehow manage to get themselves onto computers through Protected Mode. I know this because I treat people's laptops which describe the conditions you specify: UAC on and IE7 being used. These are also the kind of people who need help saving Microsoft Word documents, so I'm sure they didn't randomly disable UAC and reenable it.

As a side note, the only effective way to prevent browser-based attacks is to use discretion, as well as a Javascript filter of some sort. Like Firefox's NoScript.
True enough, but I see it as cutting down one more attack vector that can be used. UAC isn't going to protect from most malicious software but its still doing something to prevent certain types of attacks. (at least, until an exploit is found, patched, and a new one is found which is about as shocking as a can of pop exploding when left in the freezer)

Also the people you're describing are those who visit MysterySiteXXX and are going to get infected with or without UAC (or a firewall, antivirus, or any other safeguards)
Starscream
Conquest is made from the ashes of one's enemies.
6110
author=myersguy link=topic=3161.msg62257#msg62257 date=1234844648
Gateway

I have found the root cause of your problem!
author=GreatRedSpirit link=topic=3161.msg62277#msg62277 date=1234848718
True enough, but I see it as cutting down one more attack vector that can be used. UAC isn't going to protect from most malicious software but its still doing something to prevent certain types of attacks. (at least, until an exploit is found, patched, and a new one is found which is about as shocking as a can of pop exploding when left in the freezer)

Yeah. However, it is kind of silly to globally auto-accept prompts if you're already going through the trouble of keeping it on for the other features. That's like digging an underground passage to your castle while locking the main gate.
At least you only have to dig it once (unless you work in tech support and have to deal with a bunch of new Vista machines taken to hell and back again. I got lucky and never had to deal with Vista)
Pages: first prev 12 last