Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Microsoft Retracts Private Folder Option 336

An anonymous reader writes "Just recently, an update to Windows added the option to password-encrypt a personal folder. The intent was to allow users who share PCs to have a measure of privacy, but C|Net reports the company is now removing that functionality with a patch. IT managers hit the roof when the option was added, complaining of the possibility of lost passwords and inaccessible data." From the article: "'Oh great, have they even thought about the impact this could have on enterprises. I'm already trying to frantically find information on this product so that A) I can block to all our desktops and B) figure out how we then support it when users inevitably lose files. I can see the benefit in this product for home users, but it's a bit of a sloppy release by Microsoft,' Stuart Graham said in a posting on Windows Server-related site MSBlog."
This discussion has been archived. No new comments can be posted.

Microsoft Retracts Private Folder Option

Comments Filter:
  • If it actually worked as advertised, that'd be something I'd want to use. The correct answer for companies is to 1) forbid its use (just like you wouldn't let employees PGP-encrypt their work), and 2) find out how to disable it in Active Directory. Don't just dike out the functionality, though!
  • by gasmonso ( 929871 ) on Saturday July 15, 2006 @01:51PM (#15725080) Homepage

    I always find it amusing when you have IT people developing features for Windows that really don't understand IT in the real world. Then they release something and are shocked when IT managers are furious over it. One would think MS would have a real good understanding of the IT environment and what is and is not a good idea. Good stuff :)

    http://religiousfreaks.com/ [religiousfreaks.com]
  • Sigh.. (Score:3, Insightful)

    by ChowRiit ( 939581 ) on Saturday July 15, 2006 @01:53PM (#15725092)
    Couldn't they have just put a warning message/dislaimer in?

    This sort of kneejerk reaction, removing a useful feature, is excedingly irritating. It's not users aren't aware of the fact that if you password something, you'll then need to REMEMBER the password...
  • incompetent? (Score:5, Insightful)

    by MustardMan ( 52102 ) on Saturday July 15, 2006 @01:55PM (#15725104)
    I'm really starting to wonder if windows administrators should be working at my local burger king instead of with computers. It seems an awful lot of MS policy is dictated by these neanderthols. Hey - nice encryption feature added, and admins freak because they don't know how to block it. Sounds like the administrator's fault - they can't keep their users from installing unauthorized software? Encrypted folders should be the LEAST of their worries.

    It reminds me of the idiotic microsoft security fix cycle. Every user in the world has to wait for MS patch day because some whiney admins wanted to be able to schedule their vacation time. Hey jackasses - if you don't want to update on a given day, don't update on that day. Why should the rest of us be waiting for a fix to fit someone else's schedule?
  • by Ichigo Kurosaki ( 886802 ) on Saturday July 15, 2006 @01:55PM (#15725105)
    I tried this out on my personal computer and the most annoying thing about it is that you have to store it on the desktop.

    There are far better third party folder encrypters out there than MPF.
  • by fisher182 ( 110270 ) on Saturday July 15, 2006 @02:00PM (#15725123)
    perhaps they simply aren't as incompetent as the so called "IT managers" and therefore don't think at that level?

    "this looks good, let's release it." "oh noez i can't keep my users from installing this and then forgetting their passwords! arrrrrrgh m$ is teh evils!" "damn, these idiots managed to mess up a good thing once again, pull it back until the clowns managing networks can catch up to the rest of us or get fired and replaced with people who didn't go to Burger King Tech Institute."
  • by dfloyd888 ( 672421 ) * on Saturday July 15, 2006 @02:04PM (#15725136)
    Windows Private Folders was released with the best of intent, but I can see 3-4 things that would have made it not so controversial.

    First, document how it stores/encrypts files. Does it sit on a front-end of an archiver or is it a pass-through encryption similar to what CFS does? What encryption algorithms does it use? WPF needs a lot more documentation.

    Second, release a group policy add-on that domain admins can use to restrict or block its use. MS should have released a domain policy add-on a couple weeks before the utility is available, so companies can push out a policy denying use of this utility on their network, or specifying a "master" password using a password or an EFS key for recovery reasons. This utility is good, but on computers owned by a business, this utility can create major liability and regulation issues.

    Third, it needs to be written with security in mind. How is the password stored? Is the password hashed, or is the password stored by decrypting part of the file similar to what TrueCrypt does so a hash algorithm failure doesn't compromise security? What mode (ECB, CBC) is the encryption running in? Is the decrypted password stored in secure memory, or can it be swapped to disk?

    Windows Private Folders isn't a bad utility, and I wish MS would release a version 2.0 of it that addresses concerns of business domains and some more documentation on how it works -- it is made for an easy to use place for home users to stick files in they don't want others to read. WPF just needed a little more planning behind its release.
  • Fsck IT (Score:4, Insightful)

    by Detritus ( 11846 ) on Saturday July 15, 2006 @02:12PM (#15725154) Homepage
    It's a shame that Microsoft caved in to the whining of the IT control freaks. There are legitimate reasons to encrypt sensitive information, even in the corporate setting. If you think that the possession of the Administrator password means that you should have unfettered access to every scrap of data on the network, you need to see a psychiatrist about your delusions.
  • by dfloyd888 ( 672421 ) * on Saturday July 15, 2006 @02:13PM (#15725156)
    Sometimes its about obsessive-compulsive lockdown freaks, but unfortunately in a number of businesses, IT *has* to be control freaks so the business doesn't get fined out of existance and people put in prison. Banks, hospitals, and other industries have to be very careful not to run afoul of HIPAA, Sox or other laws, unless they want the SEC to start coming in with a motion of discovery in hand to start auditing, and hit the company with very high fines should even a single financial E-mail have been deleted instead of being archived for seven years. No company wants the SEC or some audit board to start going through every file, folder, or hard disk, so its pretty normal for an IT group to be heavy-handed.

  • by Opportunist ( 166417 ) on Saturday July 15, 2006 @02:16PM (#15725171)
    I might be no expert in this area, but ... let's see...

    1. Patch for data encryption feature.
    2. User using data encryption.
    3. Patch for removial of data encryption.
    4. User accessing his encrypted data ... how?
  • by Anonymous Coward on Saturday July 15, 2006 @02:16PM (#15725172)
    But why are enterprise end users installing software? Dont blame Microsoft for your problems.

    Why are you frantically trying to block something you dont know about - why dont you solve that problem by only allowing the software that has been approved? Why are there people that still dont understand that if a user can install appX, they can install virusX too? I mean really, you do understand this right?

    This was a home user product. IT wasnt intended for businesses.
  • by petard ( 117521 ) * on Saturday July 15, 2006 @02:17PM (#15725174) Homepage
    Instead of pitching a fit about new Microsoft software, why don't "I.T. Managers" do their jobs and manage the damn I.T.? Really. There are complex problems in I.T. for large businesses, but this is absolutely not one of them. Microsoft has given them the ability to manage software isntallations for years now. It's very simple, really. Users who cannot be trusted to install software like "Private Folder" without exposing the enterprise to increased risk of data loss should not have permission to install software. Full stop.

    Is it really easier to shout at Microsoft than restrict users? Because shouting at Microsoft won't prevent users from using the dozens of equivalent apps available for download from other companies unless you also restrict users appropriately.
  • by MoneyT ( 548795 ) on Saturday July 15, 2006 @02:24PM (#15725193) Journal
    Not that I agree with incopetent IT managers who can't figure out how to lock certain options in a system dictating software policy for Microsoft but while individuals may have a right to privacy and to keep things to themselves, they certainly don't have a right to store it on MY system. The problem is, too many people assume that because they use something it is now theirs to do with as they please and that's not the case. The computer belongs to the company, if they let you do non work related things on that computer that's their perogative but you have no right to use that computer for any purpose other than those the company allows you to do. Now by the same token I believe that if a company is going to require that I use my personal equipment for a job, that I have the same rights and control over that equipment as they have over theirs which means if I want to store that information triple encrypted that's my perogative because it's my machine. But unless it's a personal machine, you have no rights to do anything on it.
  • Key escrow? (Score:3, Insightful)

    by tepples ( 727027 ) <tepples.gmail@com> on Saturday July 15, 2006 @02:30PM (#15725215) Homepage Journal
    You can't decrypt data by saying "THIS IS YOUR ADMINISTRATOR, OPEN UP!"

    Unless all decryption keys are registered on the domain controller.

  • by ivan256 ( 17499 ) on Saturday July 15, 2006 @02:40PM (#15725246)
    I agree, but at the same time, turing this feature off is equally as logical as removing the delete key from the system.

    You already have a level of trust with your users. Why doesn't that trust extend to a new techology with the same level of associated potential concequences (data loss)?

    The only possible answers to that question are that you don't really trust your users at all (in which case you're a moron for giving them any access before giving them training), or that you don't understand the new technology. Which is it?
  • by nurb432 ( 527695 ) on Saturday July 15, 2006 @02:47PM (#15725280) Homepage Journal
    Just tell users 'if you use this and lose data you are on your own' and ' if you use this and hide anything you are violiting our AUP and subject to termination'.

    Actually we do allow PGP, under the premise 'if you hose it, your data is gone'.
  • Re:incompetent? (Score:5, Insightful)

    by 93 Escort Wagon ( 326346 ) on Saturday July 15, 2006 @02:49PM (#15725291)
    "It reminds me of the idiotic microsoft security fix cycle. Every user in the world has to wait for MS patch day because some whiney admins wanted to be able to schedule their vacation time. Hey jackasses - if you don't want to update on a given day, don't update on that day. Why should the rest of us be waiting for a fix to fit someone else's schedule?"

    Ah, who says Microsoft doesn't know how to do PR? "Patch Tuesday" was indeed sold to us as being schedule friendly; but the actual intent was to improve Microsoft's security image. Microsoft realized that releasing patch after patch every few days was making people think (rightly) that their OS was riddled with bugs and holes - even the non-IT press was talking about it.

    It seems to have largely worked. What with the "express install" option and such, most folks don't even realize they're installing 18 separate patches for a given month. We even get people on here, who should know better, mouthing untruths like "Oh, no one even knew about those holes until Microsoft patched them - so it's the user's fault if they get hacked".

  • Re:Fsck IT (Score:5, Insightful)

    by jimicus ( 737525 ) on Saturday July 15, 2006 @02:52PM (#15725300)
    Being able to access the data and actually doing so are two different things.

    I need to be able to access the data, if only for backup purposes. The person in the company with the password might be run over by a bus tommorow. Or if you prefer something less dramatic, they may regularly change their password (good!), forget their old one (who cares?) and then need to restore from an old backup to prove what was on the system 6 months ago (Ah....).

    But at the same time, with that power comes responsibility. If I was found to be accessing the data for any purpose other than "to provide a copy to give people who have a legitimate need to access it", I'd be sacked so fast....
  • Re:Sigh.. (Score:4, Insightful)

    by will592 ( 551704 ) on Saturday July 15, 2006 @02:53PM (#15725303)
    I'm sure people will flame for this, especially hard core IT types, but at some level the reason that users forget passwords lies with IT/Security types themselves. Forcing users to remember passwords on multiple, disparate systems that each have unique restraints (No passwords that have been used in the last X changes, 3 different character classifications, passwords must be X characters long, that must be changed every X days) almost forces users to write down their passwords somewhere that they can retrieve them easiy. The problem is further compounded when the users is locked out after only a very few attempts. I understand the reasoning behind every rule but it is unreasonable, in my opinion, to force some sort of data entry clerk or analyst to remember logins for 4 different, often times rarely used, accounts that all have different security parameters. If you can't provide single sign on for your users and you have DOD grade requirements, then I think you lose the justification for being upset when they forget their passwords.

    Just my humble opinion,
    Chris
  • Re:Key escrow? (Score:5, Insightful)

    by Trepalium ( 109107 ) on Saturday July 15, 2006 @02:53PM (#15725304)
    I see you've never worked in support, have you? The sysadmins WILL be held responsible for all data on the network, even if they are not given access to it. Therefore, it's in the syadmin's best interest to make sure that they can acquire access to it in any type of emergency. Besides, with full access to all the workstations, do you think that bypassing encryption on files that are still accessable is terribly difficult? There are a lot of keyloggers out there, and I'm sure one of them would be able to sniff the password as it was entered. If you're unable to trust your system administrators, you've got bigger problems.
  • by jimicus ( 737525 ) on Saturday July 15, 2006 @02:57PM (#15725318)
    By the way, the folders are fucking ENCRYPTED. You can't decrypt data by saying "THIS IS YOUR ADMINISTRATOR, OPEN UP!"

    IMO, most of the "But we need to be able to stop the admin seeing stuff" comments are probably from kids still in school, who would rather the affected data was lost than be readable by the admin in the event of something bad happening. (They generally give themselves away when they say "My school blocked this...")

    It would be interesting to see how many of them retain this view the first time they lose data in a work environment.
  • by kfg ( 145172 ) * on Saturday July 15, 2006 @02:59PM (#15725321)
    MS seems to have forgotten who their real customer is.

    Dell, the RIAA and the DVD Forum.

    KFG
  • Re:Fsck IT (Score:5, Insightful)

    by Kadin2048 ( 468275 ) <.ten.yxox. .ta. .nidak.todhsals.> on Saturday July 15, 2006 @03:02PM (#15725330) Homepage Journal
    I think you're viewing the issue too narrowly.

    In any large company, there is a lot of information floating around that you are probably better off not having access to.

    While it doesn't make sense to have every secretary and general low-level peon be able to encrypt stuff in such a way that nobody can ever recover them, I would not want to have automatic access to extremely sensitive high-level stuff stored on the executive's systems. Why? Because if somehow it gets leaked, and you have the root password, you have zero plausible deniability. In other words, you become quite easy to scapegoat.

    If you work someplace where there isn't any internal backstabbing, and nobody above you would ever consider hanging their poor sysadmin out to dry in order to save their own pillowtalking ass, then great. Let me know where to send my resume.

    Generally speaking, while I would want to be sure that I had admin/override rights to all the people below me in a chain of command, I wouldn't want to have those rights to people above me in the chain of command. Not because I'd find the idea of reading my boss' email particularly tempting, but because when something Bad Happens, I want to be able to say with absolute candor, not only didn't I do anything, but I couldn't possibly have done anything.

    It's like having the keys to a file cabinet which contains information way above your security clearance level. I wouldn't want to have them, because I don't want to be the guy in the hot seat when somebody way above my pay grade fucks up and decides to find someone expendable to take the blame.

    Let the executives have their personal encrypted folders, with a nice big warning sign that says "If you forget your password, NOBODY ELSE WILL BE ABLE TO ACCESS THIS." If they forget their passwords, then it's their problem, or if they maliciously encrypt things as they're tendering their resignation, then it's Legal's problem. The last thing I'd want to do is make it my problem.
  • "On XP home, I can give my users only the most basic rights, they belong to the group Users. This is as limited as it gets, and they can still install programs by default (they just have to be signed and can't make machine/domain level changes)."

    Of course, we're talking about the enterprise here, so XP Home is an exception. In an Active Directory domain, using Group Policy I can pretty much lockdown whatever I need to. I could make your start menu have only a couple items, make your account use a predefined user profile (and a read-only profile at that so, that any changes you make are gone at next login). I can even set domain-wide everyone's home page in Internet Explorer (and I can change pretty much every other setting in IE as well). The point being here, is that as the original poster said, you can lock Windows down to disallow users installing updates from Microsoft.

  • Re:Sigh.. (Score:4, Insightful)

    by CastrTroy ( 595695 ) on Saturday July 15, 2006 @03:09PM (#15725353)
    There's nothing wrong with writing your password down and keeping it in your wallet. You keep your credit cards, money, social insurance card, and a lot of other important stuff in your wallet. Why wouldln't your passwords be safe in your wallet. Besides, if you write them in a secret code, then nobody else can read them.
  • by FractalZone ( 950570 ) on Saturday July 15, 2006 @03:16PM (#15725375) Homepage
    I always find it amusing when you have IT people developing features for Windows that really don't understand IT in the real world. Then they release something and are shocked when IT managers are furious over it. One would think MS would have a real good understanding of the IT environment and what is and is not a good idea.

    Many IT administrators are barely-in-the-closet fascists. They enjoy making sure that their user bases have no privacy, cannot use their organizations phones or computers for anything that isn't "strictly business", are constantly under surveillance at the workplace, etc. These admins are usually on power trips -- they are usually hated by the users of the systems they (supposedly) support and those users often take pleasure in working against them in subtle (or at least anonymous) ways. These "Users versus IT Gestapo" situations are often entertaining to observe, as long as one isn't part of the problem.

    At the other extreme are the system and network administrators who allow (even encourage) users to do (or install) whatever they damn well please on their workstations (unless the action is obviously malicious or illegal). These admins must be masochistic -- the more computer illiterate the user base, the more likely it will figure out ways to create problems which require a week's worth of IT's time to correct, on a daily or even hourly basis. These nearly anarchistic computing environments are a lot of fun while they last -- which is rarely for longer than it takes for an oh-so-clever user to crash a server, delete someone else's files, sell organizational secrets, buy a drop-in pr0n site package and run it on the facilities at the workplace, make (what she thinks are) anonymous death threats, etc.

    Somewhere in the middle are the administrators who can usually leave their work at the office at the end of the day but who don't mind if users want to access and maybe save personal email messages or other files from work (where the spiffy color laser printer sometimes gets used to print pictures of a worker's newborn baby or a photo that an employee wants to hand in his cube), and realize that most sane people don't truly compartmentalize their work and personal lives; that overlap is normal and natural, usually inevitable, and often beneficial -- that most folks want/expect some personal privacy in the workplace and to be cut a little slack when using office resources for personal reasons.

    As someone who has tried to fall into that third, loosely defined group of IT administrators/managers when I've held such positions, I find it to be worth the effort to do the balancing/juggling act. Then again, I'm a practical libertarian and not a compulsively anal authoritarian by nature.
  • by rah1420 ( 234198 ) <rah1420@gmail.com> on Saturday July 15, 2006 @03:25PM (#15725406)
    Just tell users 'if you use this and lose data you are on your own'

    Suuuure. That will work when the CEO comes a-knockin' on the door... "uh, Nurb, I had my speech to the local Chamber of Commerce in this folder, I sweated bullets on it for six weeks, the speech is in three hours, and [I forgot the password|the password doesn't work]."

    we do allow PGP

    My point exactly. It's doubtful the CEO will know enough to PGP encrypt a file, but they do know how to get to that context menu quickly enough...

    Not that I'm espousing deleting the functionality, mind you; it's pretty cool. But the premise of "making the user responsible" seems credible in inverse proportion to the level at which the person is in the company.
  • Re:incompetent? (Score:2, Insightful)

    by MissP ( 728641 ) on Saturday July 15, 2006 @03:27PM (#15725414)
    The reason Windows is the dominate operating system in the solar system is because it allows the so-called neanderthols to accomplish a lot, without really understanding the hows or whys. The fact that this is also the source of a myriad of other problems is really pretty irrelevant from a strictly business point of view. Microsoft is a hugely successful company because of this approach, so it should not come as a surprise that "a lot of MS policy is dictated by these neanderthols".
  • Re:Key escrow? (Score:5, Insightful)

    by zCyl ( 14362 ) on Saturday July 15, 2006 @03:53PM (#15725494)
    I see you've never worked in support, have you? The sysadmins WILL be held responsible for all data on the network, even if they are not given access to it.

    This is like saying the Postal Service is responsible if a letter I write in Sanskrit arrives at its destination in Sanskrit instead of English.

    The sysadmin should preserve the data just fine, the encrypted data. If employees keep losing their work to encryption, treat the employees the same way you would treat them if they keep inadvertantly shredding important documents. You wouldn't complain to the shredder company because the shredder doesn't have an undo button.
  • by GiMP ( 10923 ) on Saturday July 15, 2006 @04:53PM (#15725667)
    > Firefox is nice for home users, but it has no place in the corporate world yet.

    The problems you cited are problems in Windows, not in Firefox. In fact, Firefox has a built-in auto-update feature. On Linux systems, it is included in in the distribution's auto-updates.

    The problem is that MS Windows does nothing to provide a centralized auto-update feature. If anything, your argument is to mean that Windows has no place in the corporate world yet.. which, is true, but not in practice.
  • Re:Who cares... (Score:3, Insightful)

    by Knuckles ( 8964 ) <knuckles@@@dantian...org> on Saturday July 15, 2006 @05:13PM (#15725724)
    so you can deny having stored porn when your gf tells you to show her

    You know, I see this a lot on /. about gfs and wives, and enough is enough.

    I don't know if you people have no gfs or wives, or if you live in the US, or what. If you can't tell your gf/wife what porn you like you have a bigger problem than how to encrypt it. How the fuck do you think you can have a satisfying relationship if you can't reveal intimate desires?

    Get out into the real world or, respectively, move to a place where the christian idiots didn't brainwash everyone, where females are into porn and all kinds of other fun things.
  • by fullofangst ( 724732 ) on Saturday July 15, 2006 @05:34PM (#15725780)
    Nice quote from Stuart Graham there, complaining about all the extra work he now (alledgedly) has.

    I replied to him on that site. If he's not running a decent group policy to stop non-admin users from installing any old crap on their machines, he deserves all the extra work he gets. If he's any kind of enterprise sysadmin, he wouldn't even bat an eyelid at this piece of software.
  • by Anonymous Coward on Saturday July 15, 2006 @05:41PM (#15725802)
    The problems you cited are problems in Windows, not in Firefox. In fact, Firefox has a built-in auto-update feature. On Linux systems, it is included in in the distribution's auto-updates.
    So are you suggesting that regular users get write access to Firefox' directory? That's a no-no. Do you give all users on your Linux/UN*X boxen write access to /bin, /sbin, /lib, /usr/lib...? Are you saying that users on Linux get to update the one and only copy of Firefox on the system, sans sudo?

    Windows has nothing to do with this. Program files go into, well, Program Files. That's a strictly read-only directory for the Users group. And that's why, to update Firefox, you have to run it as administrator. The same holds for all other software - except that MS software gets updated through WSUS, and to some extent, can be centrally controlled through AD group policies - something that's unavailable in Firefox.

    What is your point?

    The problem is that MS Windows does nothing to provide a centralized auto-update feature.
    Of course not [windowsupdate.com]. Oh, you were talking about The One True Repository; well, you're out of context here.

    If anything, your argument is to mean that Windows has no place in the corporate world yet.. which, is true, but not in practice.
    It's true in your delusional mind - hundreds of millions of corporate workstations running Windows without problems and hundreds of millions of users refute your insane claims.
  • by aaarrrgggh ( 9205 ) on Saturday July 15, 2006 @10:23PM (#15726514)
    There are plenty of good reasons for encrypting data on a work machine. The first one that comes to mind is personal data stored on the machine, such as tax returns, or scanned copies of ID and credit cards for emergency use. Sure, people really should keep it on personal machines and not work machines, but that isn't always practical.

    Companies with "Big Brother" policies also come to mind. Things like your personal resume (which we should always keep up to date), or contact lists might be construed as someone job-shopping and lead to retribution. Seen it happen.

    Lastly, there is the legitimate issue of controlling data access at a more granular level. All kinds of HR information need to be eyes-only, and not subject to the SysAdmin's probing eyes. One old job, the system administrator found the spreadsheet with everyone in the company's salary, coming bonus (2 months), and raise (3 months out) information. This led to several people jumping ship or demanding more money, and created a lack of trust of management. Personnel disciplinary letters should also be protected in some organizations.

    Without the facility, many of these documents become "sneaker-netted", which doesn't help the organization any.
  • by GiMP ( 10923 ) on Saturday July 15, 2006 @11:13PM (#15726656)
    > Also, your assertion that Windows does not provide a centralized auto-update feature is patently wrong.
    > Be knowledgeable before criticizing. You make open source advocates look like ignorant, frothing
    > zealots when you blow up into a clueless rant. Google for Software Update Services (or SUS). It is
    > exactly what you claim does not exist, and it works for all of the mainline MS products (Windows,
    > Office, IE, and their server products).

    Last I checked, "Windows Update" and "SUS" will not look into a central repository on the internet to locate and apply updates to Firefox, OpenOffice, Norton AntiVirus, Photoshop, Winamp, iTunes, or any other application that isn't made by Microsoft.

    I'll go so far as to claim that Microsoft unfairly leverages their monopoly to apply easy, integrated updates to their products without providing facilities for 3rd-party products. To say that Firefox isn't ready for the enterprise because it isn't included in Windows Update is to blame Firefox for Microsoft's actions.
  • by GiMP ( 10923 ) on Saturday July 15, 2006 @11:26PM (#15726687)
    >> The problems you cited are problems in Windows, not in Firefox. In fact, Firefox has a built-in
    >> auto-update feature. On Linux systems, it is included in in the distribution's auto-updates.
    > So are you suggesting that regular users get write access to Firefox' directory? That's a no-no. Do you
    > give all users on your Linux/UN*X boxen write access to /bin, /sbin, /lib, /usr/lib...? Are you saying
    > that users on Linux get to update the one and only copy of Firefox on the system, sans sudo?

    First, I never claimed that regular users should be applying updates. The argument is the the grandparent complained that Firefox isn't ready for the enterprise because there aren't any updates, but IE gets updates. The counter-argument is that Firefox provides an update feature, while IE doesn't. If you are to claim that the user shouldn't have rights to upgrade firefox, then the same argument should apply that they shouldn't be allowed to update IE. If a secure installation of a Windows machine won't let a user install updates, why would you think that a linux system allow it?

    Secondly, in practice, a lot of companies give their users administrative access to their Windows computers, esspecially to traveling laptop-warriors. I think that giving users an Ubuntu installation, which includes graphical sudo for all basic administrative tasks has significant advantages over an "always run as administrator" setup on Windows. While some versions of Windows have "Run As", this feature is poorly implemented and must be manually, not automatically invoked.

    If you have a controlled network environment, it would not be difficult to install SSH and a public key to every Linux desktop and execute apt-get on each machine (there are plenty of utilities available to facilitate this). If you do not have a controlled network environment, then you could give your users access to apt-get, or an apt-get frontend, via sudo. If you run Red Hat Enterprise Workstation, you can manage this all from a web-frontend.
  • by RShizzle ( 983535 ) on Sunday July 16, 2006 @01:25AM (#15726979) Homepage
    Unfortunately, user stupidity is something IT constantly has to worry about. Imagine if you're the IT Director, and the President has just locked the annual budget reports in an encrypted vault. It's somewhat difficult to just point a finger at him and laugh.

    Though Mac OSX has some great features, and is a fine operating system, it does not support some of the niche software and does not have the capabilities to be deployed in a company of hundreds, or thousands of computers. There could very well been issues with the filevault had it been deployed in corporate environments en-mass. Tools like Active Directory is absolutely crucial to running most IT infrastructures, as is controlling user access to the server and their own computer.

    One of the key goals of an IT department is to make it impossible for the user to screw up their system, not to say "nope. we don't support that" when someone makes an error, which is inevitable.

    I find your post somewhat naive. What you're suggesting isn't practical or realistic. It just isn't how departments of any sizable company work. To allow "Joe to crack his thumb with the hammer" might very well leave systems vulnerable to outside attack, or allow precious company data to be lost. Just because Joe was stupid doesn't mean that the consequences of his actions will be acceptable.

    Instead, it would make more sense to have such a feature off by default (in Corporate versions), and easily controlled through GPOs in the Active Directory. Another option is when it's enabled, an additional key is created and stored by the IT department, preferably on a backed-up drive inaccessible to everyone.
  • in otherwords (Score:3, Insightful)

    by geekoid ( 135745 ) <dadinportland&yahoo,com> on Sunday July 16, 2006 @04:28AM (#15727267) Homepage Journal
    Microsoft forgot that other companies treat there users like dumb shits and don't want to face up to the facts.

    People, stop being fucking elite about the computers. I have worked with people who are scared to do anything with the computers becasuse of IT's attitude.

    Here is a clur, tell the people if they use it and loose the password the data is gone. Most people will get that. If they don't and they loose valuable data too bad. They'll catch on, or they will be shown the door.
  • Re:Who cares... (Score:3, Insightful)

    by drsmithy ( 35869 ) <drsmithy@nOSPAm.gmail.com> on Monday July 17, 2006 @09:59PM (#15735131)
    I think you mean a video called "Sailor Moon and the 7 ballz".

    If you have an Empornium account, this this [empornium.us] is it.

Never test for an error condition you don't know how to handle. -- Steinbach

Working...