Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Microsoft already replied (Score 2, Insightful) 388

From Microsoft's reply:

* The only way this could be changed without the userâ(TM)s knowledge is by malicious code already running on the box.

* In order for malicious code to have gotten on to the box, something else has already been breached (or the user has explicitly consented)

What exactly is UAC then trying to protect people against? If protecting against malicious code isn't in the requirements, then it seems pretty useless.

Comment Watermarks (Score 4, Interesting) 237

Watermark stuff where it is useful so you can see where copies of stuff have come from. Don't bother trying to track things you can't actually track (file viewing, opening, printing, etc).

The watermark doesn't even have to be high tech, it can just be a guid inserted at some point in the document, with a company policy that says when you can remove it (never?), when you should change it (when it crosses a boundary, like a departmental boundary) and how records should be kept (e.g. a central database of which event caused the creation of a new guid).

Slashdot Top Deals

Truth has always been found to promote the best interests of mankind... - Percy Bysshe Shelley

Working...