Earthstation5 Responds to Malware Claims 207
"We at Earthstation5 are not perfect, but we acknowledge that Shaun Garriok might be and thank him for helping us root out bugs.
The problem with the Earthstation5 software that Shaun Garriok found truly exists; however, the sordid motives he attributes to Earthstation5 are incorrect. The following functions were put into Earthstation5 to allow automatic, remote upgrade of the Earthstation5 software.
These functions are:
- Reload Earthstation5
- Shutdown Earthstation5
- Delete a File
We have long been admirers of Shaun Garriok's ability to superbly investigate even a fully compiled program. We believe that he is capable of finding ANY sort of trojan, worm, or bug inside a compiled program. We are relieved that all he could find was these remote upgrade functions. He didn't find any bugs that send user data anywhere, no spyware, no adware, nothing, in fact, that gives away any personal information about the user using Earthstation5.
It is also a fortunate fact that since Earthstation5 protects you from the RIAA lawsuits and hackers by hiding your ip address, the exploit program he wrote can only be used against your own computer, which he states in his exploit. If you want to delete files from your own computer, we feel you have the right to do that.
We are glad he found this bug and pointed it out. We completely removed the automatic software upgrade code because as it turns out automatic upgrade is no longer popular as it once was because it gives people an uneasy feeling and rightly so.
Since Shaun Garriok seems to be concerned about everyone's security, and is not on a personal quest for revenge, we would be grateful if he would download the latest Earthstation5 (version 1.1.31), and verify that we have truly removed the remote-update function which his exploit program accessed. We think his dedication to the good of all concerned would motivate him to do this. Anyone else who is concerned can do the same; download the latest Earthstation5 and test the exploit code against it.
-- Filehoover, Lead Programmer of ES5."
I'm surprised (Score:1, Funny)
I WISH THIS MY PROPOSAL WILL NOT COME TO YOU AS A SURPRISE... I CRAVE YOUR INDULGENCE AS I CONTACT YOU IN SUCH A SURPRISING MANNER. BUT I RESPECTFULLY INSIST YOU READ THIS LETTER CAREFULLY AS I AM OPTIMISTIC IT WILL OPEN DOORS FOR UNIMAGINABLE FINANCIAL REWARDS FOR BOTH OF US...
# Important Stuff: Please try to keep posts on topic. # Try to reply to other people's comments instead of starting new th
Re:I'm surprised (Score:2)
Geez...
You don't get sued for using KaZaA . . . (Score:2, Insightful)
Re:You don't get sued for using KaZaA . . . (Score:2)
This only protects your identity from a VERY casual seeker; In many cases, your originating IP address may still be visible.
Overnet has the same feature, but warns you up front (well, on the FAQ page) that it only protects you in a very limited fashion.
And, of course, all the RIAA/MPAA (MAFIAA) has to do is put up a couple of open proxy servers, get them in to the samair.ru list or others, and q
Well? (Score:1)
I've seen worse things put into code on purpose, I might be able to accept this was a mistake, who knows?
But I've also heard rumours they've been behind some DDOS of good people. That might make be question their motives.
Either way, whenever you install anything that you didn't compile and read and
Re:Well? (Score:2)
An RPM package upgrade can, in principle, delete arbitrary files, so why shouldn't this upgrade code? Any code that performs remote upgrades may have to be able to perform pretty much arbitrary file system operations.
The real issue is that application programs have to have this sort of thing in them
Re:Well? (Score:2, Insightful)
A reasonable auto-upgrade would just have code for the client to delete itself and run the new install I'd think. Also just because ES5 hides IPs doesn't mean someone can't just scan to find people running it. If anyone can connect to you and delete any file, that's a little more than an auto-upgrade feature
Re:Well? (Score:2)
No. They may have to remove old DLLs, temporary files, etc., for the same reason an RPM package does.
RPMs may delete files but don't sit and listen on an open socket accepting delete requests from a remote server somewhere.
Yes, that part is different and quite worrisome. But no matter who originates the upgrade, the code doing the upgrading needs to be able to perform pretty much arbitrar
Re:Well? (Score:2, Informative)
1) client looks for new version
2) client downloads new version
3) client check digital signature of download
4) client runs temp program
5) temp program uninstalls old client and installs new
Re:Well? (Score:2)
Come on, think a little. If it can download an entire application over the net and then install it, that means it can run arbitrary code. In particular, it can delete whatever the user running it has permission to delete. There simply is no meani
Re:Well? (Score:2)
Yes. And furthermore, just about any installation/update program will contain data-driven file system manipulation. It will therefore appear to contain a system call to delete files whose names are specified by data.
The ES5 explanation that this was part of their remote auto-update feature is perfectly credible.
However, even if you believe this ES5 mis-feature, was really for updates, it was the worst po
Re:Well? (Score:2)
An RPM package upgrade is performed only when and because the root user says so. This is quite different from arbitrary code downloading itself from a remote server, executing itself and deleting files without your say-so.
I still stand by my earlier statement about closed-source code. Why should I trust any executable if the authors won't even let me look at the source code? Surely if they had nothin
Re:Well? (Score:2)
I don't have to do anything to have it happen, and I can't do anything to stop it from happening (other than not runn
Re:Well? (Score:2, Interesting)
Why would you ever need to delete a file? (Score:2, Insightful)
Re:Why would you ever need to delete a file? (Score:2)
Re:Why would you ever need to delete a file? (Score:2)
Yeah, I remember when I had my first beer.
Re:Why would you ever need to delete a file? (Score:2)
http://www.xent.com/FoRK-archive/mar98/0250.htm
http://web.morons.org/feature/rants/godwin2.jsp
This was addressed yesterday... (Score:5, Informative)
Re:This was addressed yesterday... (Score:2, Insightful)
They fixed the issue, that is good. (Score:2)
'find a bug or an issue, they release a fix soon afterwards'..
If they didn't, people would be bitching about that too.. Geez
( disclaimer" I'm NOT a supporter/user of the thing, but their treatment around here is rather hypocritical )
Re:This was addressed yesterday... (Score:3, Insightful)
If you do something nasty, get caught, and backpedal it looks suspicious.
If you do something inadvertent for perfectly altruistic reasons and get accused of falling into the prior catagory and say, "Oh, shit. Ok, we fixed it," it looks just as suspicious.
If you suspect conspiracy everything always looks like it.
KFG
Re:This was addressed yesterday... (Score:2)
Adults or children? (Score:3, Insightful)
Re:Adults or children? (Score:2)
Try his criticism of James Fennimore Cooper. Although the target was dead his fans were legion and rabid.
Sometimes a flippant and well crafted sacastic reply is just what the situation calls for. My own experience is that the brighter the responder the more likely is sarcasm in a rebuttal.
Unless you live in a world of gray flannel suits walking stiffly and a
Re:Adults or children? (Score:2)
Re:Adults or children? (Score:2)
Delete file is not required remotely to upgrade (Score:2, Insightful)
To me, this sounds like damage control, not an honest representation of why that code was in their program. Until the company that makes Earthstation comes up with a plausible explanation for what that code was doing in their program, I will regard Earthstation software as suspect.
Re:Delete file is not required remotely to upgrade (Score:3, Insightful)
Well, for your application's security's sake, I sure hope the delete procedure isn't directly initiated by a server package, where the server is unverified as well. By adding 1 and 1, the resulting security exploits is quite easy to understand.
I think we all are a little more paranoid since 9/11.....
This hasn't anything to do with 9/11, this has to do with common sense regarding computer security and network pro
Re:Delete file is not required remotely to upgrade (Score:2)
How do you not notice (elipsis) (Score:3, Insightful)
Re:How do you not notice (elipsis) (Score:2)
1. "I did not have sexual..." - deny, deny, deny! OR
2. "It's, not a bug, it's a feature!"
[there are other routes, but none as attractive]
Both are very well known methods used widely in mainstream accusations. A lot of
Re:How do you not notice (elipsis) (Score:2)
This is also a well know method in mainstream accusations to accuse without being accussable of making accusations.
The maker of the statement knows that the public will interpret any denial with suspicion that the nonaccusation is true, (otherwise why would he deny it so vehemently?)and any refusal to deny it with suspicion that the nonaccusation is true (otherwise why doesn't he just deny it?).
KFG
Re:How do you not notice (elipsis) (Score:2)
That's true in general terms, but in this case (if indeed that was the case), it could have been easily avoided if, for example, none of the files
Here is why I care, but it does NOT affect me... (Score:5, Interesting)
Ouch (Score:2)
You're not a record industry mole, are you? Just checking. Because how can anyone be so sure that free filesharing is here to stay if *this* is the only way to use P2P safely?
If you're like most people, and just hunting for that cool song you heard on the radio... it would be easier to buy the CD (and cheaper, if your time has any value).
Re:Here is why I care, but it does NOT affect me.. (Score:5, Interesting)
I am not trying to flame, but that's what the RIAA is trying to do: Make people afraid to share. If that happens, then the networks will die themselves. The RIAA doesn't give a flying fuck about downloaders, the same way cops don't really care about petty drug users. They both know that you must cut off supply.
Not afraid to share, afraid of the apps' authors! (Score:4, Interesting)
Re:Not afraid to share, afraid of the apps' author (Score:3, Informative)
Re:Here is why I care, but it does NOT affect me.. (Score:2)
Trying to kill a thing by cutting off the supply is a Really Bad Idea.
Re:Here is why I care, but it does NOT affect me.. (Score:2)
You're right! If the RIAA cuts the supplers off.. the amount that the downloaders are currently paying to get stuff might double... triple... maybe, just maybe, even increase a hundredfold!!
I just don't know if I could still afford it.
Re:Here is why I care, but it does NOT affect me.. (Score:2)
So the price isn't mandatory cost of the software -- but folks who build P2P systems still have *some* kind of motivation, right?
Maybe it's ego -- doing something daring, dangerous and flashy. If there's plenty of supply of P2P software, folks running Yet Another P2P Network don't get nearly the ego boost as they would if they were one of a few and there were a huge crowd interested.
Maybe it's banner advertising money. If there are fewer P2P programs out there to buy banner
Re:Here is why I care, but it does NOT affect me.. (Score:2)
The RIAA shutting down the "sharers" has no (direct) effect on the P2P companies. The RIAA tried shutting down the P2P companies already and failed.
Re:Here is why I care, but it does NOT affect me.. (Score:2)
What's your point? The users are (largely) guilty of copyright violation; the companies are (largely) guilty of knowingly facilitating them in this. Either is a fine target, and both have been succesfully sued.
The RIAA shutting down the "sharers" has no (direct) effect on the P2P companies.
Whatever your motivation, be it ego or advertising dollars -- take away your user base, and you no longer get any.
Re:Here is why I care, but it does NOT affect me.. (Score:2)
Actually, that's not true. The RIAA has not won a single lawsuit against a P2P company since Napster.
Whatever your motivation, be it ego or advertising dollars -- take away your user base, and you no longer get any.
I think you are agreeing with me in a wholly interesting way. The argument that I thought was silly was "if you get rid of the sharers, the price of downloading will increase". When I made a joke about that, the argument quick
Re:Here is why I care, but it does NOT affect me.. (Score:2, Informative)
AWESOME LINK! THANKS :) (Score:2)
How much HDD space do you use for VMware images? (Score:2)
Re:How much HDD space do you use for VMware images (Score:2)
Just 1 gig. I have a 120 gig serial ata drive, not too worried about space. Even so, VMWare only needs about 1 gig. That's for a full install of XP, and the few utils for antivirus, spybot, firewall, etc. A small price to pay IMO.
Re:How much HDD space do you use for VMware images (Score:3, Insightful)
Re:How much HDD space do you use for VMware images (Score:2)
Re:Here is why I care, but it does NOT affect me.. (Score:2)
I think having spyware, et
Re:Delete all personal info from Windows? Yeah rig (Score:2)
Simple.
No. (Score:2)
Runs on Win and Linux too!
Hiding IP Address (Score:3, Interesting)
Somone scans a network of cables users, and sends them all the packet and command to delete boot.ini. How does 'hiding' your IP address help?
If they have the feature in for automatic updates (unsigned), then clearly they expect to be able to connect to it using, what else, an IP ADDRESS, "hidden" or not.
Hard to beleive they have 15 million folks on at the same time.
Re:Hiding IP Address (Score:3, Insightful)
Article:
It is also a fortunate fact that since Earthstation5 protects you from the RIAA lawsuits and hackers by hiding your ip address, the exploit program he wrote can only be used against your own computer, which he states in his exploit. If you want to delete files from your own computer, we feel you have the right to do that.
augustz:
How does 'hiding' your IP address help?
It doesn't. He's full of shit - and I bet he's dumb enough to believe that shit.
He screwed up rather badly, it's just a shame
Re:Hiding IP Address (Score:4, Insightful)
In all honesty I really don't care if there is code that allows remote deletion of a file in ES5. I refused to use it long before this. Ignoring the horribly ugly GUI, there are still many other concerns. Who guarantees the proxies you use are safe and don't keep logs? Can't the RIAA's enforcers set up a bunch of "anonymous" proxies and advertise their presence on IRC, Usenet, and other file sharing circles? How is spouting propaganda about hiding the IPs in the GUI supposed to make me think you know jack about network security? Being based in such an unstable area may help protect the company and/or developers, but that doesn't say anything about the users. With the developers constantly taunting copyright enforcers, how long will it be before they start targeting users? An over inflated sense of security is the worst enemy of P2P users. Encrypted data transfers don't mean anything. The enforcers don't sniff packets anyway. All they do is download a shared file, verify it's copyrighted, and issue a subpoena. If they can't get past the proxy, they will just have it taken down. Just pray that it didn't keep some sort of log. Eventually, the only operating proxies will be so obscure, distant, slow, or overwhelmed that nobody will use them and he network would slow to a crawl. The only decent servers will be RIAA honey pots. All this because some developer got cocky and started running his mouth.
Re:Hiding IP Address (Score:2)
No, he didn't want to imply anything. The context of this sentece which matters for him is exactly this:
IOW, in worst marketing/politician manner, he wanted to plug once ag
Re:Hiding IP Address (Score:2)
place! Nobody's safe!
In all seriousness, anyone that thinks you can "scramble" an IP address and still use a protocol like TCP is full of shit. I'm sure you could think of all sorts of bizarro schemes to bounce packets around using raw sockets and UDP spoofed source addresses or
One question (Score:3, Interesting)
Does anyone use Earthstation and how does it compare to the other p2p networks?
Re:One question (Score:4, Informative)
BS - ESV Results were great! (Score:3, Funny)
Re:One question (Score:2)
I admire their explanation... (Score:5, Insightful)
Anyway, ES5 has a *baaaad* name and this last exploit is by far not the only reason of it.
Their claims of having zillions of users online(ever tried to use it???Well, not *exactly* true.), the chat snippet about DoS-ing bittorent sites(What kind of looser would do that???). A couple of "spammers" posting on the "concurrent" p2p tools boards.....
To conclude... ES5 has never been an option for me, and even if their claims on absolute privacy are a nice dream, I prefer sticking to Klite and Bittorent experimental.
Not to mention... (Score:3, Funny)
Re:I admire their explanation... (Score:2)
1. delete files
2.
3. profit
(just joking).
But seriously, given you have the methods he cites, i.e. reload, shutdown, delete, please explain to me how such an upgrade should work? Remember how windows locks files which are in use.
And why on earth should it be necessary to remotely delete files for an upgrade?? And note that he just talks about reload (i.e. restart), delete, and shutdown, how did they intend to actually automatic
IP Address Obfuscation (Score:2)
If you are establishing connections to a remote machine, there is probably a method by which an individual can determine your IP address. "Intermediary proxy servers" are susceptible to compromise, too.
ES5 Other Employees Comments (Score:5, Interesting)
This guy wants a patch to a closed application and would not listen to any one about exploits as the don't want to pay the $50,000 they would give to anyone finding an exploit. This guy posted Shaun's home address in the ES5 forums and threatened his family life.
This is thier network admin doing this, would you trust him with your IP and thier fancy anonymous security? If they want to keep any standing, at a minimum they need to fire that guy as his comments.. well I just don't trust him and in most places threats like he made are illegal.
Re:ES5 Other Employees Comments (Score:4, Informative)
The forums can be accessed at http://formus.es5.com [es5.com]. It requires a username/password; I set up an account with u/p slashdot/slashdot, and that should work.
The quote in question is from the user "SharePro" in the thread "Danger do not use ES5, ES5 too easy to hack"; at present, it's on page 36 of the thread and it's the fourth post from the top. I can't find the home address of Random_nut (the person being berated by this fellow SharePro, a person who has 2666 posts on the EarthStation5 boards and is in "Group: Admin"); but one user has the address in his/her .sig - search for "Shaun AND Aberdeen" to see what I mean.
For context, here is the whole message (I have emboldened the part quoted by AC):
You obviously dont know me very well if you think I am the type to deny shit. I have answered much more harder questions.
Obviously (and you can quote me), if I know about a breach in security, then its not an issue of denying it, its an issue of fixing it. Since now that Filehoover obviously got a message before I did, and its fixed, there is nothing to deny. I was not here today, and everybody on this board knows that I am here everyday, so if I wasnt here, then I WASNT HERE!
Should I just let the breach sit there and say "Hey everybody, here is a breach in security"? C'mon, you do have brains. So you really dont make sense. Filehoover may have re-compiled without that specific code, and not changed the build number. So what? What is your point? A cover up? What cover up?
I wasnt here today, and Filehoover isnt here now. It appears that he found out about it, and fixed it and now cased closed. ES5 is still the most securist P2P program.
Kazaa had an exploit not so long ago and it was also fixed that left their entire network vulnerable to be turned down. There is a difference between somebody hacking and something that was left over accidentily. Random Nut didnt hack ES5, all he did was see some extra code.
According to the build numbers he posted, he has spent months on this program and that is the most he can find? Code that is not in use and that was accidently left over? I would have expected more.
I agree and can be quoted as saying that it should not have been there. I WILL EVEN SCREAM THAT IT SHOULD NOT HAVE BEEN THERE. Deny? Wtf should I deny?
I think its pretty fucking pathetic that he made a crack instead of a patch, so like I said, if I were him, I'd look behind my back. You attack me or my users, and yes, I will send people to your front door. I dont fuck around because the responsibility that I have to my users does not allow me to fuck around. Rules changed, and he probably doesnt know how to play them. My identity is sealed, so again, he doesnt know who his enemy is. He is not anonymous nor is his family.
I have known who Random Nut is for a while. Did you know that Kazaa wants his address to sue the fuck out of him for manipulating their code and making a derivative out of it? I wouldnt give it to them because why should I? I'm not Random Slut, I dont fuck people simply to fuck them.
Did you know that the RIAA / MPAA wants his address to sue him? The list goes on including various law orgnizations. I wouldnt give it to the RIAA either because I hate the RIAA. I handle my own problems. But in reality, now that I am printing it, you can bet that it will appear everywhere by various people. I will also be printing pictures of him and
Re:ES5 Other Employees Comments (Score:2)
http://forums.es5.com [es5.com]
FORUMS not formus. stupid self stupid.
Also I dug up the post wherein "Share_Pro" posts the alleged personal details (home address but no phone number). It's on page 32 of the above thread, the fifth post down. If you want to read really funny trollish material, read the rest of that one; he goes on about how ZeroPaid.com is "OWNED AND CONTROLLED by Digital Rights Management" and "their" allegations that EarthStation5 is a fro
Show me the code! (Score:3, Interesting)
Don't trust ES5 anyway... (Score:5, Interesting)
Not that I'd trust that AC either, but be on your guard anyway.
Re:Don't trust ES5 anyway... (Score:2)
The RIAA has formed a shell company under their control to infiltrate and infect the music file sharing networks. They have outsourced it into the the extralegal hands of Hamas. They will be using this network to gather data on p2p users, spread malicious code to make people afraid of using p2p networks and generally raising mayhem.
There. I've explained it. Does that mean I can trust them now?
KFG
moving along (Score:2)
To be honest and blunt... Who gives a rat's ass? Let's be realistic about something here; if someone purchased a product which injures you, or doesn't work to your expectations, what do you do? You get your money back and move on to another program. So what's the big deal here?
Firstly it's a free damn program, so it's not like nothing is lost unless someone is a moron knowing what they 'could' do, and still using the product.
FYI do you know how many times I see emails from companies like Symantec, Windows
Much Ado About Nothing? (Score:2, Redundant)
Why this is a story worthy of Slashdot confuses me in some ways. People make false claims all the time, and when it is one as inconsequential as this then why are we giving it so much attention?
False? (Score:2, Interesting)
Whether or not these were implemented for remote upgrading wasn't the point, Random_Nut was showing it as a vulnerability that could be exploited in an already 'shady' program. I will admit, that I haven't used ES5 though, because I simply believe it is a load
Oops. (Score:2)
We don't get a Slashdot story every time Microsoft finds vulnerabilities in its software, do we? No. And thank God for that.
Re:False? (Score:2)
Need to be able to delete files to upgrade? (Score:5, Insightful)
These functions are:
Reload Earthstation5
Shutdown Earthstation5
Delete a File
All of these functions are necessary to perform when upgrading software.
Hell no.
These guys should learn something about computer security. Funny that the same guys who're using a solution that screams "EXPLOIT ME" is developing some application that's supposed to be focused on extra security.
This is how to perform a teeny bit safer automatic upgrade:
- Server sends a packet containing a field that says it's an update packet, along with a version ID to update to, i.e. 110 for version 1.10 or whatever.
- Client receives packet and uses a partial client-side URL to the place where the new version can be downloaded. For example, the client could use the partial URL "http://www.es5.com/files/es", attach the received version ID (that is: "110") to the string, and finally the file extension, to form the URL "http://www.es5.com/files/es110.zip". The client then takes care of its shutdown, auto-install, and restart sequence.
Voila! Upgraded application without a RANDOM UNVERIFIED COMPUTER sending the CLIENT a message to DELETE something and it BLINDLY AGREES to. It's amazing that such poor programmers can even design something that compiles. Or are they hired by the RIAA to fool people into downloading their "new, cool and extra safe" application?
I wouldn't recommend anyone to download the DNS-faking "we-have-more-users-than-Kazaa" dudes' software.
Bwahahaha (Score:5, Funny)
It is also a fortunate fact that since Earthstation5 protects you from the RIAA lawsuits and hackers by hiding your ip address, the exploit program he wrote can only be used against your own computer, which he states in his exploit.
There are some things money can't buy, for everything else, there's netstat -i
Damn. (Score:2)
COINTELPRO (Score:2, Informative)
You either love it or you hate it... (Score:2)
I love how all the positives sound almost the same. It's as if maybe 2 or 3 people (the people involved in ESV?) wrote all the positive comments. The negative comments speak for themselves.
OK Then (Score:2)
Comment removed (Score:3, Funny)
Hiding an IP address (Score:2)
Re:Hiding an IP address (Score:2)
Re:Hiding an IP address (Score:2)
Yeah, I thought about methods for doing that, but eventually someone is sending you a packet that can be read from the buffer and easily decoded to see whom is sending this file. No?
Re:Hiding an IP address (Score:2)
These idiots cant code. (Score:2, Interesting)
Sounds like earthstation's stepping up at least! (Score:2)
Oh man this seems a bit weak as excuse go. (Score:5, Informative)
This is one solution, and I am pretty sure bunch of people here can come with others. But having a delete command is certainly a loosy way to do that. Heck on the net it OBVIOUSLY means that you open the door to an attacked reverse engineering your app for bad purpose and allow it a nice way to wreak havoc on a system. Either their application E.S.5 is not that great as they are hypping it (haha), or they really are searching excuse for obvious malware. If this is the second option which is true, the next malware code will be hidden behind encryption and packet won't be easily decoded.
people go away from ES5. You will from now on have now way to determine if you are not installing a trojan on your computer UNLESS they give you the source code and a compiler to compare the final binaries md5 with what you can generate...
Re:Oh man this seems a bit weak as excuse go. (Score:2)
I mean, nowhere I read that the network port was closed after the exploit code was issued, so the application continued to run. How could it then delete itself?
If this isn't possible, an automatic update (which they incidentally didn't use to push their new corrected version, you have to download it yourself, it seems) had to start another process
it's still a security hole (Score:2)
This is why: ALL GOOD P2P APPS ARE **OPEN SOURCE** (Score:5, Insightful)
P2P opens up a whole different degree of responsibility for local system resource usage, and in fact the primary function of a p2p app is to manage local system resources on behalf of a 'greater good' of bigger resources provided to the community.
I wouldn't really put much faith in any p2p solution provider who didn't have full disclosure of source code as a priority in their front line for dealing with their users
I mean this as a potential professional user of p2p [ampfea.org], as well as a personal user too.
Observations on ES5 (Score:2)
2. Their application does not work. Pure and simple.
3. They lie about the number of users online.
4. They have an high number of "features" with no obvious sense or meaning.
5. They distract the user with chat, dating, movie downloads (?).
6. They are highly aggressive: "declare war on the RIAA, Palestinian
Re:Oh no! (Score:2)
Re:Do End Users Want These Features (tm) (Score:3, Informative)
I spent about three weeks once working on a scripted install of Acrobat Reader, Netscape, VirusScan, NTSP4 and a few in-house apps; all with custom setup files/registry keys and setup for
Re:Do End Users Want These Features (tm) (Score:2)
Now, if Acrobat and Netscape were to start running automatic updates without asking you for permission
Re:Do End Users Want These Features (tm) (Score:2)
I won't. There is no legitimate reason for this "functionality" to exist. None. Zero. Nada. Not for upgrading, or anything else.
An upgrade may (will?) have to delete files, but that should be performed by the installer after the upgrade has been downloaded, it should not (and must not) be performed arbitrarily by an unknown, untrusted host, with no authentication mechanism at all, without any ackn