^^ Seems our pet is starting to loose it's touch. ;)
forgot to inlude the url to the referenced article.
Printable View
^^ Seems our pet is starting to loose it's touch. ;)
forgot to inlude the url to the referenced article.
Props to Donald on this one, I was not aware that Windows did such a thing?
Unfortunately he has left out the link to the MVP's article :(
@ joem11
This looks like nVidia making things convenient for themselves, but potentially compromising your security in the process.........please see the interesting link posted by bludgeon.
I am about to build a machine with onboard and independent nVidia graphics so I will be able to see if this account and SLI work together, or if it is just a gaming and/or laptop utility.
The reason I posted in the first place was that it created a potential security hazard on a machine where it had no functionality whatsoever. It should at least have been local rather than global?
//off topic:
I think that I am beginning to see how Donald works..........at first I thought his stuff was way off target, but now that just seems to be my narrow minded approach at the time.
He appears to provide additional information, not specific to the post in question...........a bit like the "obiter dicta" of high (supreme) court judges? //
:D
EDIT:
@ HYBR|D
You beat me to it! .........breakfast interrupted my post :drink:. I have edited Donald's contribution slightly to make more sense, and put it in context.
This may be a blessing in disguise for security. If you were to have (on a business/pro Windows) multiple "admin" level accounts for specific applications such as GFI LANGuard, application updaters, etc... you can add them all into specific security groups to facilitate locking down the machine.
This will allow you to grant them the needed admin rights, while subjecting them to GPO and file/registry permissions that you would not be able to reasonably apply to Local System, Local Service, or Network Service. If one of them is compromised for any reason, they would not have that critical access that the compromise would need to take over the system. It will never be perfect, but it will allow that extra mitigation capability.
The way I see it, limiting possible compromise scope is just as important as limiting attack surface and direct compromise. Proper file permissions on temporary folders is the best defense against browser 0days, and the same can be said for any high risk application.