473,440 Members | 1,746 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,440 software developers and data experts.

Why shouldn't I trust my own application?

I attended a Microsoft seminar yesterday on Click Once technology. The
presenter urged us to restrict our smart client applications to the minimum
security settings possible and gradually increase the security as needed.
My question is: Why?

I could understand if this was an application that was going to be
downloaded by J.Q. Public and during the download they were going to be
informed of the permissions my app would require. Then the user could
decide whether or not to "risk" downloading and running my application.
That would make sense. However, in our case, we're building an application
for sale. Once our customer has bought our product, they implicitly trust
us to run on their machines. In that scenario, why would I limit the
security settings? This only introduces the possible of exceptions being
thrown with no apparent upside.

Am I missing something here?

TIA,

Mike Rodriguez

Nov 17 '05 #1
3 1060
"Michael Rodriguez" <mi**@nospamforme.com> wrote in
news:#h*************@TK2MSFTNGP15.phx.gbl:
building an application for sale. Once our customer has bought our
product, they implicitly trust us to run on their machines. In that
scenario, why would I limit the security settings? This only
introduces the possible of exceptions being thrown with no apparent
upside.

Am I missing something here?


Yes, hackers.
--
Chad Z. Hower (a.k.a. Kudzu) - http://www.hower.org/Kudzu/
"Programming is an art form that fights back"

Empower ASP.NET with IntraWeb
http://www.atozed.com/IntraWeb/
Nov 17 '05 #2
Mike,

Don't take this the wrong way, but it is hubris to assume that you
should be given full trust for your application just because you are
building an application for sale. If anything, even if I am paying for a
program, I still want to know that on ^my^ machine, the software isn't going
to be able to do anything that I don't want it to do. In the end, you can't
possibly know all of the things that every user is going to want to do or
prevent from happening on their machine (as the result of your software
running or not), so asking for full trust is asking for quite a bit.

In the end, full trust is a bad thing, and should only be used in
exceptional cases. Most software (and most likely yours as well) does not
fall in this category.

Also, in the end, as the developer, you should know what is required for
your application on the security side (instead of just a blanket assumption
of full trust). It goes a long way to establishing trust with those that
are going to use your software.

Hope this helps.

--
- Nicholas Paldino [.NET/C# MVP]
- mv*@spam.guard.caspershouse.com

"Michael Rodriguez" <mi**@nospamforme.com> wrote in message
news:%2***************@TK2MSFTNGP15.phx.gbl...
I attended a Microsoft seminar yesterday on Click Once technology. The
presenter urged us to restrict our smart client applications to the minimum
security settings possible and gradually increase the security as needed.
My question is: Why?

I could understand if this was an application that was going to be
downloaded by J.Q. Public and during the download they were going to be
informed of the permissions my app would require. Then the user could
decide whether or not to "risk" downloading and running my application.
That would make sense. However, in our case, we're building an
application for sale. Once our customer has bought our product, they
implicitly trust us to run on their machines. In that scenario, why would
I limit the security settings? This only introduces the possible of
exceptions being thrown with no apparent upside.

Am I missing something here?

TIA,

Mike Rodriguez

Nov 17 '05 #3
In article <#h*************@TK2MSFTNGP15.phx.gbl>,
Michael Rodriguez <mi**@nospamforme.com> wrote:

: [...]
: Am I missing something here?

Do you login as Administrator all the time? If you can trust
your own application, you can trust *yourself*, right?

Greg
Nov 17 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Graham | last post by:
I have created a custom MembershipProvider called "LassieMembershipProvider" that derives from "MembershipProvider". This providor is located in a Businesslogic layer dll called...
2
by: g3000 | last post by:
I used VS .Net 2003 to run a c# web app. but when I run it I get the below Security Exception Description: The application attempted to perform an operation not allowed by the security...
7
by: AmitKu | last post by:
I am trying to do a URL post using HttpWebRequest, but it fails because I am hosting on Network Solutions, and their servers are all medium trust. Apparently HttpWebRequest doesn't work on medium...
1
by: Xesued | last post by:
Im farily new to ASP.NET. I am using a hosting service that has medium trust. I configured my computer for medium trust as well so I can develope local and plublish later. My problem lies with the...
5
by: =?Utf-8?B?S1A=?= | last post by:
I have an asp.net application that I've installed on several of my customers laptops (they run a localized IIS). I've been doing this for years without and issue. Today I attempted to install...
6
by: =?Utf-8?B?Um9nZXIgTWFydGlu?= | last post by:
I have configuration data for a web application stored in a file galleryserverpro.config located in a config folder off the root application. Web.config references this file like this:...
4
by: =?Utf-8?B?Um9nZXIgTWFydGlu?= | last post by:
Is it possible for a medium trust web application to read the Membership providers? The following throws a SecurityException: MembershipSection membershipSection =...
5
by: Michael Howes | last post by:
I'm upgrading a VS 2003/.Net 1.1 ASP.Net application to VS 2008/.Net 3.0 The application uses an older version of the Microsoft Data Blocks for database access. The version in the...
4
vikysaran
by: vikysaran | last post by:
Hello, I have my new application on Godaddy.com server. Previously it was giving error on Permission. i asked support about it and they told me to set trust level MEDIUM so I search over the...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.