Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Businesses OS X Operating Systems Apple

Mac Trojan Horse Disguised as Word 2004 785

Espectr0 writes "Macworld is alerting of a malware program for the Mac. A Macworld reader alerted the magazine to the malware after he downloaded the file from Limewire. The reader told Macworld: 'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta. The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.' However, he added: 'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'" This sounds similar to the recent trojan horse proof-of-concept. There are many ways to make one file look like another, on any platform. This is 2004, you should know by now not to open a file from an untrusted source.
This discussion has been archived. No new comments can be posted.

Mac Trojan Horse Disguised as Word 2004

Comments Filter:
  • Think first (Score:5, Insightful)

    by BWJones ( 18351 ) * on Wednesday May 12, 2004 @03:55PM (#9131162) Homepage Journal
    The reader told Macworld: 'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta.

    Using Limewire? A likely story.

    The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.' However, he added: 'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'"

    This is the risk you take when downloading stuff that you don't pay for. If you purchased Office 2004 from Microsoft (thus supporting the promotion and development of software for OS X), then you would have something to gripe about. As it stands, one might suggest you got what you paid for.....

    This is 2004, you should know by now not to open a file from an untrusted source.

    Well said. However, this does raise the possibility of other code that could be made to look like just about anything. So, once again, think about what you install on your computer just like you would think about what you eat or who you have sex with. If you don't know, trust or suspect that software/food/person, then either screen them or think twice.

  • Why Not? (Score:3, Insightful)

    by tarballedtux ( 770160 ) on Wednesday May 12, 2004 @03:59PM (#9131224)
    Every OS is vulernable to the ultimate virus: Stupidity.Virus.a Only one release was needed.
  • by davidu ( 18 ) on Wednesday May 12, 2004 @04:00PM (#9131227) Homepage Journal

    This should be filed under the "Humans" topic as this has nothing to do with apple or even computers.

    Trojan Horses are social problems -- there isn't much apple or microsoft or anyone can do other than try to keep people on their toes.

    I mean come on, limewire?

    davidu
  • I'm lost (Score:2, Insightful)

    by oneishy ( 669590 ) <jczebota&oneishy,com> on Wednesday May 12, 2004 @04:01PM (#9131254) Homepage

    Is it just me, or did I miss all the Trojan like aspects of that program?

    Yes, it had undesirable consequences of running an un-trusted application, but Trojan?

  • Hmm (Score:3, Insightful)

    by Bullet-Dodger ( 630107 ) on Wednesday May 12, 2004 @04:02PM (#9131273)
    This sounds similar to the recent trojan horse proof-of-concept.

    Not really, no. The point of that was that it was a application that looked like an mp3. This is just a application with a misleading name/icon. Anyone write code that erases a users home folder and call it Microsoft Word.

  • by Alcimedes ( 398213 ) on Wednesday May 12, 2004 @04:03PM (#9131301)
    He doesn't mention this in the article, but I was wondering if this asked him for a password before it executed.

    I would assume it would have to before it runs an rf command on his home directory.

    If it didn't ask for one, that's not good. If it did and he entered it in, he's a complete moron. Although the reality is, any OS will always be vunerable to user stupidity. It's the worms etc., that are a serious problem.

  • by Conesus ( 148179 ) on Wednesday May 12, 2004 @04:04PM (#9131315) Homepage
    Sure, that file came from an untrusted source. In fact, doesn't it serve them right to get bitten by illegally downloading software? Software that should cost money, and in fact does (quite a bit).

    But forget that fact that this happened on an unethical download. The fact that this is malware, not a virus or a worm, not something that is exploiting the operating system by opening known bugs or attempting to hack into key parts of the system which normally would require keychain access, but that this is merely software that the user chose to install, and chose to authenticate (maybe? did it require keychain access to be able to delete files from the home directory? I think Apple probably allowed that to happen since programs *do* need to be able to write files to the Home directory, just not anywhere else, save for a temporary folder like /tmp).

    Just keep in mind that while the program itself was not ethical, nor were the actions of the user by downloading non-free software, this should come as no surprise to the user or to Apple, since this is not a compromise of the system nor something Apple can prevent, except through education (Don't open untrusted files and programs).

    Do you think this would have happened if the user was downloading legit sourceforge or another self-produced program that claimed to do something else and just became malware or a random pop-up creator? Would we cry foul if the program was *not* downloaded illegally?
  • Actually... (Score:5, Insightful)

    by rtilghman ( 736281 ) on Wednesday May 12, 2004 @04:04PM (#9131330)

    If it was a windows installed you could check to make sure that various files were signed and authenticated by MS, information which I don't believe can actually be faked (dlls, exe, cab files, etc.).

    I don't know if Mac has a similar feature, and I don't know if some random moron like this guy would even have bothered to check. However, it would seem that MS' own security would indeed have offered a better chance of preventing such a Trojan. :)

    -rt
  • by Homology ( 639438 ) on Wednesday May 12, 2004 @04:05PM (#9131340)
    'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'"

    A similar program om Windows could do far more than just hose someones Home folder, because most Windows users runs with high privileges.

  • by 7hrs4sec ( 771720 ) on Wednesday May 12, 2004 @04:06PM (#9131359)
    I wish I could say I'm surprised at the gullibility of this particular user, but I'm surrounded by an office full of similarly-minded folks. They're of the click-before-you-consider mindset simply because "we're on macs... all that bad stuff is for Windows users." I'm in hopes they're not all anxious to try out Word 2004.
  • Re:Sort of... (Score:3, Insightful)

    by Daniel Dvorkin ( 106857 ) * on Wednesday May 12, 2004 @04:08PM (#9131404) Homepage Journal
    I've been a Mac user for a looong time now, and although the (relative) safety from malware is one of many things I like about using a Mac, I still think that in this situation, the user is at least as much to blame as the person who created the malicious file. There is no excuse for anyone who uses a computer, of any kind, in this day and age, not being aware of the danger of double-clicking on files from an untrusted source. (Cue snarky remarks about how even if it came from microsoft.com, the source would still be untrustworthy ...) Blame is not a fixed quantity -- in any crime, we blame the perpetrator, but sometimes there's some extra blame for the victim as well.
  • Re:New paradigm? (Score:5, Insightful)

    by Bonker ( 243350 ) on Wednesday May 12, 2004 @04:09PM (#9131421)
    Surrrrreeee they thought it was a beta. Uh huh. That's why they went to Limewire rather than the MS website. Sure. Yeah.

    Open Office porters take note. At my last check, Mac users are still stuck with a sucky x11 version of OOO1.1 rather than the spiffy version available for Windows users.
  • by heyitsme ( 472683 ) on Wednesday May 12, 2004 @04:10PM (#9131444) Homepage
    1) Create shell script with "rm -rf $home/*"
    2) Package script with Microsoft Icon
    3) Upload to P2P network
    4) ???
    5) Laugh as retarded Slashdot editors call it valid malware

    Come on guys... lets get serious.
  • by foidulus ( 743482 ) * on Wednesday May 12, 2004 @04:12PM (#9131491)
    You have to wonder, word is a pretty hefty piece of software, did the attackers even bother padding the program? A really quick download time would be one of a multitude of clues that what you are downloading probably isn't legit.
  • by Anonymous Coward on Wednesday May 12, 2004 @04:13PM (#9131511)

    Here is the latest mac virus. written completely in applescript.

    tell application "Finder"
    activate
    set target to folder home
    delete target
    empty trash
    end tell

    This won't actually work though because r/o access to the root of the home directory is provided through applescript. This is really a non-event in trojan terms. It's affected a user trying to pirate software, be it beta Microsoft stuff. I guess you get what you deserve for installing beta office builds... :-)

  • by ducomputergeek ( 595742 ) on Wednesday May 12, 2004 @04:15PM (#9131549)
    Here is a better idea: don't try beating the system. 90%+ of all computer problems are really not lack of secure code, its the idiot sitting in front of the screen. While getting Office and other programs from p2p may be trendy and even "cool" to some, you run the risk that it might not be as advertised.

    Out in the professional world we do pay for everything. Why? In the last 6 months, two graphics designers in this town were busted for using warezed versions of Photoshop and black listed by other companies in the area including long time clients. And advertising/marketing being cut-throat as it is, there were glaring stories about it in the local business journal. Wow, probably $100k+ income lost to save $5k on software. Smart move there!

    If there was such a thing, then download from a MS website or trusted mirror (like download.com) or else roll the dice and take your chances.

    Personally I am waiting for the $10 for shipping beta from MS as I am classified as an "IT manager/decision maker" for our company (and several others as I also do consulting).

  • by stratjakt ( 596332 ) on Wednesday May 12, 2004 @04:15PM (#9131555) Journal
    No, I don't own a Mac, but I've worked with OSX a little, and more apps than should pop up that little sudo-dialog thing.

    So if the trojan popped up the "you must enter your administrator password to continue" box, how many would without asking questions?

    I mean the guy thought he was getting a beta release of word2k4 off of limewire?

    How big was the package he downloaded? Hundred megs or so, like word would be, or some 50k zip?

    UNIX doesnt magically protect you from stupidity, or from making mistakes.
  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Wednesday May 12, 2004 @04:18PM (#9131593)
    Comment removed based on user account deletion
  • by Anonymous Coward on Wednesday May 12, 2004 @04:19PM (#9131615)
    There is no secure system, and never will, as long as there are mentally-challenged users who blindly trust software from not-100%-legit origins.

    And bragging that such and such OS is more-secure-than-thou does not help either. The least-gifted users of this OSs will believe this and will feel a false sense of security and run whatever application falls on their hand. Most of these will be honest appl, but it takes only one to wreak havoc.

    As Albert Einstein said,

    Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.
  • by Mustang Matt ( 133426 ) on Wednesday May 12, 2004 @04:20PM (#9131633)
    What better way to get the "security problem" media focus off yourself than by exploiting a competitor.
  • by kuwan ( 443684 ) on Wednesday May 12, 2004 @04:20PM (#9131637) Homepage
    This has nothing to do with the Mac platform or the security of that platform. If I can convince you to run a malicious program, on any platform, then I can do pretty much whatever I want to your system.

    This exact same problem exists for Linux, Windows, Solaris, and *BSD. Unfortunately people will probably take this example to mean that the Mac OS X platform is somehow insecure because of it. I could do the exact same thing for Windows and if you would download it from LimeWire (or any other untrusted source) and run it then it could do just as much damage.
  • by bw5353 ( 775333 ) on Wednesday May 12, 2004 @04:21PM (#9131640) Homepage
    There seems to have been one really silly user who fell for about the oldest trick in the book - calling a bad executable something nice. Why do Macworld even bother reporting it?

    It is a non story even if it happened, and it is unlikely to have happened. Unless the guy is a 10-year old who fell for a trap his 11-year old sister set up for him.

  • by Anonymous Coward on Wednesday May 12, 2004 @04:24PM (#9131691)
    There's nothing Apple can or should do. Aliasing 'rm' to 'rm -i' in your shell will only work if the person who writes the virus is kind enough to run your shell and let it load your aliases. They could write the commands in Applescript rather than using rm. They could write a C program to do it. This is all moot.

    If you have the power to delete all of your own files, then any program you run has that power too. Nothing can change that. Trojan horses are nothing new, and nothing surprising. They are a problem on every platform, even Linux, and have nothing to do with the operating system or the computer.

    There are companies that call people on the telephone and convince them to send them a check for $300 in return for a big-screen TV they'll never receive. This is made possible because (a) people can receive phone calls, and (b) people can give money to other people. No one suggests we remove telephones or checks from our lives to prevent such fraud.

    Trojan horses are just the computer equivalent of fraud. They have been around for a very, very, very long time, and will be around until the end of time. Nothing can be done by Apple to prevent them, just as nothing can be done by Microsoft or any of the Linux distribution maintainers. It's just how life works: if you have a gun, and someone tricks you into shooting yourself in the foot, you've just shot yourself in the foot. It's not a flaw in the gun.

    So how do you combat Trojan horses? Well, Trojan horses are not new. They date back to... yep! Troy!

    Beware of Greeks bearing gifts.

    The ancient adage still holds true today. Welcome a wooden horse full of soldiers into your city, and you're going to have a tough time blaming the manufacturer of the city wall for your city's subsequent downfall.
  • by jridley ( 9305 ) on Wednesday May 12, 2004 @04:25PM (#9131706)
    Now that at least some Windows users are starting to become aware of this sort of thing, are Mac users next?
    Most Mac users I talk to do nothing but go on about how they never have to worry about this sort of thing. Seems like a group of users that's that overconfident in their systems are ripe for infection.
  • by CODiNE ( 27417 ) on Wednesday May 12, 2004 @04:32PM (#9131809) Homepage
    I just made a new user to run an rm -rf ~ on to see how it looks.

    I have to say I'm impressed with how Apple handles this situation. You actually have to do rm -rf ~/* but anyways, once your home directory is emptying there is no error message. No flood of missing files or application crashes. You just log out and log back in and hey you have the default's loaded again like a fresh user. Being a Windows/Linux switcher I have to say this is handled quite differently than I expected. At least in windows losing all your windows files is gonna cause some serious problems, may not be able to log back in again.

    Maybe I'm odd but eh. :)

    -Don.
  • by WebCowboy ( 196209 ) on Wednesday May 12, 2004 @04:35PM (#9131844)
    Remember, a good deal of the Mac users out there are clueless ex-Windows user friends that we instructed to purchase Macs after scrubbing their old PCs of viruses, adware, spyware and other such crap one too many times.

    No matter how often we tell them otherwise, it is ingrained in them to use the icon as an indictor of a file's content. If it wasn't then a great deal fewer email viruses would make it into the wild.
  • by tbase ( 666607 ) on Wednesday May 12, 2004 @04:36PM (#9131865)
    I worked on Macs as an certified tech back when the IIfx was the machine. I used to run Disinfectant on every machine I worked on, and there were tons of them that were infected, and this was on machines that didn't even have modems and weren't on networks. The only reason I bring this up is that this is probably a /. story soley because it involves a trojan or virus on a Mac. The fact that some poor schmuck actually downloaded what he thought was a commercial app from p2p network and tried to install it... this is "Stuff that matters"?
  • by LionMage ( 318500 ) on Wednesday May 12, 2004 @04:38PM (#9131892) Homepage
    I took the MacCentral website (which is now run by Macworld) to task for this, and I'll take Slashdot to task for the same thing. In some of the more reputable Mac-related news sites, this story was more accurately covered; the Trojan in question was downloaded from the Gnutella network. Limewire is not a network, it's a Gnutella client -- yet sites like MacCentral reported that the file was downloaded from the LimeWire network. Now on Slashdot, we're seeing much the same thing -- as if to imply that this Trojan is somehow only available with Limewire.

    Since there are at least 3 other Gnutella clients available for Mac OS X (Phex, Acquisition, and XFactor are the ones I know of), there are many more potential vectors for this Trojan to find its way onto a Mac user's computer.

    Yeah, I know, it's asinine to trade warez on any P2P network...

    There's nothing to stop this Trojan from making it to other file sharing networks, except perhaps a dose of common sense, so this isn't even a Gnutella-specific problem. I'm just a little peeved with sloppy news reporting.
  • by inkswamp ( 233692 ) on Wednesday May 12, 2004 @04:40PM (#9131914)
    Intego is really starting to get on my nerves with this, and their previous, alerts. You could do this little stunt way back in OS 9. Cutting and pasting icons is easy.

    Strange that Microsoft has popped up in this one, huh? Hmm... if I were a conspiracy theorist....

    The real issues is whether it can it replicate itself and whether it can use security holes in OS X to distribute itself to others. I've been round and round with people on this topic and the conclusion is that, at every point, OS X presents too great a hurdle to allow it to occur. You either have to rely on lots of Apple programs working together to do it (which is too unwieldy and too visible to the user) or you have to rely on the more stealthy Unix stuff, much of which is turned off by default (i.e., no using mail quietly in the background to distribute the trojan/virus because sendmail is off by default.)

    It seems to me that Intego is looking to scare people into buying their products and in doing so, they have blown any credibility they have.

  • Re:New paradigm? (Score:3, Insightful)

    by JVert ( 578547 ) <corganbilly@hotmai[ ]om ['l.c' in gap]> on Wednesday May 12, 2004 @04:43PM (#9131975) Journal
    No one said he belived he was doing anything legal. He could have assumed it was from a closed beta test that would not be mentioned on the website or freely avalable.
  • by SquadBoy ( 167263 ) on Wednesday May 12, 2004 @04:45PM (#9132006) Homepage Journal
    This was a person who based a choice on whether or not to run an app based on how the ICON looked. They will repeat over and over and over again and wonder why the hell their shit keeps breaking.
  • Are they Serious!! (Score:2, Insightful)

    by IAmAMacOSXAddict ( 718470 ) on Wednesday May 12, 2004 @04:47PM (#9132044) Homepage
    You gotta give me a break, this company is a bunch of idiots, or that is at least what they take us for...

    They claim there is a file out there that when you download it it deletes your home directory. I will say YES, there is...

    ONLY IF YOU ARE A FRICKIN IDIOT!!!!

    The "File" is nothing but a script that executes an "rm -rf ~" command. I can write a "Trojan Horse" with the same command in shell script, MS .bat, and numerous other scripting languages and in some cases compile it into an application as to remain unseen till it's too late. Please people stop making this shit up. If anyone seriously thinks the pirated application they are trying to get only takes 1-2 hundred K then THEY DESERVE TO GET THEIR INFO WIPED OUT!!!!

  • hahaha (Score:1, Insightful)

    by fullofangst ( 724732 ) on Wednesday May 12, 2004 @05:01PM (#9132238)
    "This is 2004, you should know by now not to open a file from an untrusted source."

    that SHOULD read...

    "This is 2004. All slashdot readers know not to open files from an untrusted source, but the rest of the world is still as dumb as ever."
  • Re:New paradigm? (Score:2, Insightful)

    by nomadic ( 141991 ) <nomadicworld@@@gmail...com> on Wednesday May 12, 2004 @05:03PM (#9132268) Homepage
    The guy was a moron.

    Well the fact that he expected us to believe that "public beta" line does call his intelligence into question.
  • by archen ( 447353 ) on Wednesday May 12, 2004 @05:09PM (#9132323)
    Holy crap, that has to be the most long drawn out boring explanation of rm -rf ~ I've ever read. I think this guy might have been one of my college professors. I imagine his explanation of DELTREE /Y C:\WINDOWS would put people into a coma.
  • by 3dr ( 169908 ) on Wednesday May 12, 2004 @05:25PM (#9132495)
    This guy deserved it. "I downloaded it thinking Microsoft may have released a public beta." Oh come on, the attempt at piracy is entirely clear.

    Everyone else knows that they never release applications for public beta testing. They only release operating systems as public betas.

  • Re:New paradigm? (Score:3, Insightful)

    by spiritraveller ( 641174 ) on Wednesday May 12, 2004 @05:31PM (#9132562)
    Another downslide is that it's very slow due to its reliance on java.
  • by soft_guy ( 534437 ) on Wednesday May 12, 2004 @05:36PM (#9132620)
    I think it would be a good idea to have a feature in OS X that could launch a program as "untrusted". It should be able to restrict the programs access to the file system, the network stack, etc. Kind of like what .Net does, except not as extreme.
  • by IceAgeComing ( 636874 ) on Wednesday May 12, 2004 @05:37PM (#9132623)
    I'd advise protecting yourself and alias rm to 'rm -i'.

    An alias is easy to defeat, so it shouldn't be seen as a good defense. An alias will not prevent the following commands from deleting files automatically: /bin/rm -rf ~
    \rm -rf ~

    Try running on a junk file after you've created the alias if you want to see for yourself.

  • by UrgleHoth ( 50415 ) on Wednesday May 12, 2004 @06:00PM (#9132903) Homepage
    Are you trolling or do you really believe that the fundamental idea of open source (not to be confused with free) software is too good to be true?

    When I made my original comment, I'm referring to the baseline that Word X is not, and as far as I know has never been a free or open product, therefore a public beta is very out of character (not to mention a good find for those who use word) and therefore suspect. As a reference point, Word X for Mac retails at the Apple store for $230 [apple.com]

  • by Forgotten ( 225254 ) on Wednesday May 12, 2004 @06:08PM (#9132999)
    My guess is that the person doesn't exist at all, and instead was created by someone from Intego. The correspondence Macworld received is fictional. This would be in keeping with Intego's manner of operation in the past. They didn't necessarily create the Trojan and inject it into Limewire, but they'd certainly want to make it known as quickly as possible.

    Like most companies selling security software for personal computers, they're basically in the business of marketing snake oil, and that means the creation of FUD. It's a new concept in the Mac world, but age-old for Windows.

    From the Intego site:

    Intego VirusBarrier X eradicates this Trojan horse, using its virus definitions dated May 11, 2004, and Intego remains diligent to ensure that VirusBarrier X will also eradicate any future viruses that may try to exploit this same technique.


    WTF is that supposed to mean? And what is "infection" in the context of a Trojan horse?
  • by one4nine4two ( 683126 ) on Wednesday May 12, 2004 @06:25PM (#9133233) Homepage
    do you really believe that the fundamental idea of open source software is too good to be true?
    He said the opposite, that he could not say that open source software was too good to be true.
  • Newsflash! (Score:4, Insightful)

    by mabu ( 178417 ) on Wednesday May 12, 2004 @06:53PM (#9133585)
    Mac user pirates a 10kB OSX version of Word and gets all his stuff deleted.

    Don't you think Slashdot is the last place where people need to be made aware of something like this?

    Turning your boneheaded mistake into a security advisory isn't going to win you much respect here.
  • /. dichotomy (Score:3, Insightful)

    by YrWrstNtmr ( 564987 ) on Wednesday May 12, 2004 @07:24PM (#9133879)
    A Mac user opens an unknown file from an untrusted source, it turns out to be destructive, and it blows away his data.
    Conclusion - said Mac user is at fault.

    Windows user open an unknown file from an untrusted source, it turns out to be destructive, and it blows away his data.
    Conclusion - Microsoft is at fault.

    Of course! How could I not see the difference?
  • Why is this news? (Score:3, Insightful)

    by Cruciform ( 42896 ) on Wednesday May 12, 2004 @08:04PM (#9134254) Homepage
    Honestly, why did this even get a link?

    User downloads executable from peer to peer network, runs said executable, and loses data.

    If it wasn't labeled MS-Word would we have even seen this? I find it highly doubtful.

    You would think by now, with all the scumware out there, people would realize that software should be downloaded at the source, or from a reputable middleman, not from anonymous sources who may have altered the payload in some way.

    It doesn't matter if it's on a Mac, Windows, or Linux machine. Running "mystery code" is just plain stupid.
  • by RedBear ( 207369 ) <redbear.redbearnet@com> on Wednesday May 12, 2004 @08:31PM (#9134445) Homepage
    We should always remember that UNIX-like permission systems do exactly what they were designed to do. UNIX was designed to run on mainframes and serve dozens, hundreds or even thousands of users. Normally this would be in a corporate environment or some other situation where the users would have limited space and limited reason to put a bunch of junk in their home folders. Also, the whole system including the dozens or hundreds or thousands of home folders would all be backed up by the organization. In this situation when one user does something stupid like this and hoses their home folder, they get a good scolding and their home folder is restored from backup (whenever the admin feels like being gracious). But that one user isn't allowed to destroy the entire system and bring the organization to a halt and destroy the home folders of every other user.

    There really is no way to protect the user from himself. If you allow that user to change or delete their own files, there is nothing short of a good backup system that will protect those files from a bad application that is allowed to run as that user. It's as simple as that.

    Or of course you could block all users from actually running any executable application outside the system "Applications" folder. I think Linux and BSD can both do this with the nodev/noexec mount options. But you'd also have to block access to things like the shell, so they couldn't run "sh rm -rf ~" and manually execute shell scripts. And you'd have to disallow any dangerous commands in AppleScript if we're still talking about Macs. In short you'd have to lock down the system so tight that it really becomes useless for most users, just to protect people like this from his inability to have a good backup and use common sense.

    But, I think if the home data is so important to everyone then personal computers should come with several FireWire backup drives the same size as the internal hard drive, and an ultra-simple backup/restore system, so they can plug one drive in every day/week and have incremental backups without thinking about it too much. It really wouldn't be too difficult, just expensive for all the extra disk space. Using external FireWire drives that get disconnected would mean that the backups can't get destroyed by a simple 'sudo rm -rf /' command. With tools like CarbonCopyCloner this scenario could be quite simple and workable.

  • However, why are OS's designed to let such a small mistake have such a dire consequence?

    If you want an OS that won't give you complete control over your own data, I think Microsoft will oblige you in a few years, and I'm sure hard drive manufacturers would also welcome an operating system that never let a user delete anything. :-)

    Mac OS X, Linux, and Windows are all designed to let the user have control of their own files, up to and including the ability to delete them without confirmation. There are no dire consequences in this particular case with Mac OS X, the system is fine: it remains bootable, the other user accounts present on the system are untouched, and the affected user account is still perfectly usable, reverting to default settings for everything. Yeah, the victim's data is gone, but if you don't make backups you're just asking for trouble anyway.

    This is nothing at all like a car having a self destruct button-- we're not talking about a special command that does nothing but trash the system here, we're talking about a perfectly valid command with perfectly valid uses. To adjust your analogy, this is like a car having an accelerator that you could push to the floor, and a steering wheel that you could use to guide it into the path of an 18-wheeler heading in the opposite direction.

    Maybe it's time that OS makers realize that computers aren't just used by sys admins, but real people, which includes kids, morons, and the gulliable.

    Microsoft did. This realization begat "Bob." 'Nuff said.

    ~Philly
  • by tc ( 93768 ) on Wednesday May 12, 2004 @09:42PM (#9134992)
    So how does the OS know the application is an "installer"?

    Suppose I wanted my installer to offer an option to convert my existing document files to a new format? Could I do that? Would the OS let me? How would I ask the user permission? Wouldn't the average user just say 'yes' if they were asked?

    Even supposing the installer is prevented from doing anything bad, how do you prevent the application once installed from doing bad things? If it has permission to read and write .doc files, say, then there are still plenty of malicious things it can do (like nuking all my documents when it's run).

    Fundamentally, my point still stands. In order to be useful, applications need sufficient permissions to do bad things, because it's not really possible to technologically tell the difference between good and bad in every case. A word processer has to be able to edit documents, so something posing as a word processor will have permissions to trash documents, and so forth.

    Again, the root cause is that the system and the user have no way of knowing that an application is trustworthy. This is a distinct problem from that of fine grained permissions.
  • Smack..... (Score:3, Insightful)

    by vwjeff ( 709903 ) on Wednesday May 12, 2004 @10:32PM (#9135321)
    I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta. The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.

    When was the last time Microsoft released ANY program on a P2P network?

    I guess I should say official release.
  • by FLEB ( 312391 ) on Wednesday May 12, 2004 @11:44PM (#9135784) Homepage Journal
    And what methodology do you use to ensure that your software is safe, I have to ask?
    ---

    Download it from a trusted source (or check it against a hash from a trusted source). It might not be totally secure, but there's a lot less of a chance of it being malicious.
  • by Anonymous Coward on Thursday May 13, 2004 @02:05AM (#9136431)
    Did this guy actually open up the package to see what the installer looked like inside, or is it possible, that maybe it was a virus with a pretty Office 2004 icon.

    The poster spent more time trying to cover up the fact that he was trying to get some software for free, than he did explaining the file that he downloaded, exactly what happened, how he dealt with it.
  • by geoffspear ( 692508 ) * on Thursday May 13, 2004 @01:41PM (#9141619) Homepage
    Macs ship with the ability of the root user to login turned off, but the "first user" and "root" have the same password by default - again it's worth changing that too (just change either password) so if you're asked by a program for your password, you can't inadvertently give that application root privilege.

    Thank you for that completely inaccurate explanation of administrator priviledges, which demonstrates you don't have any clue whatsoever what you're talking about.

    By default, root does not have a password at all. You don't need to enable the ability for the root user to login; setting an actual password for the root account (whether it's the same as that of any admin user or not) will allow root to login with that password. This is how the "Enable root access" option in NetInfo Manager enables root login. You can accomplish the same thing with "sudo passwd root" in your shell.

    As for making the root password different from the password of the first user's admin account, that has no effect whatsoever. An admin user can run sudo from the command line or give root access to the Install application (or any other application that knows how to get root access) with his or her own password no matter what you change any other account's password to.

"Everything should be made as simple as possible, but not simpler." -- Albert Einstein

Working...