B
BaltaisGulbis
First impressions on the much discussed and even more fearsome retirement of UAC:
As of today the UAC has been sent to retirement; also turned off the ''smartscreen'' for Edge which I do not use anyway (Big Bro drew an exclamation mark on the Security page, which I ignored) and it seems that the system has another ''smartscreen'' of its own anyway. To take care of the possible risks and threats (some of them are real) I will run my second line antivirus three times a day, to check for malicious stuff, and also run a specialized adware killer, although it is hard to imagine that I could get malware from the page of my company or internet bank - their IT staff is not dumb either.
Impressions after Day 1 -
- installations are faster because I do not need to react to notifications (although I still see the installer menu); this may not be recommended to absolute beginners because they may accidentally do something they did not want to, but if I have decided to install something there is no need to ask again;
- the Big Bro still polices the system, although he is a little bit less annoying, but just a little bit, like Nikita Khruschev in comparison to Joseph Stalin, one was a lesser jerk then the other but both were jerks;
- all the problems I have described earlier are still there, so the victory over Big Bro has not been won yet - but the process has at least started.
- one suspected program turned out not to be a virus, Big Bro was against downloading it but neither Windows Defender nor my second line antivirus found anything wrong with it.
It seems that the system architects (as far as I understand their way of thinking) 1. are obsessed with total control, 2. think all users are kids who do not know anything (my apologies to the young generation - you actually know more about IT than I do) and 3. there is a total, epic fail of communication between the system builders and the users, like this:
- Big Bro is needed because there are threats! Not recommended!
- Which ones?
- I said threats! Not recommended!
- Can I learn to protect myself from them?
- I said threats! Not recommended!
No wonder that some people find this approach annoying and reject the system (call it a reflex if you want to.)
By the way, 3rd party apps are also ''not recommended''. Although they do require a little bit of caution, so that you do not get a trojan or ransomware instead of what you were looking for, they are easier to use, do not bug you with updates or ads, are not linked to compulsory accounts and some of them are free.
Conclusions after Day 1: A little bit more streamlined system, more easy going for users with some experience, but nothing much has changed.
To be done:
- Finding out AND IMPLEMENTING, SUCCESSFULLY the procedure for disabling Edge (I found it but failed to carry out because of the Big Bro a. k. a. the Great Access Denier)
- Next weekend, a small junkware test (mock infection) - finding a not so bad piece of junkware online and seeing how my older machine - without important data - in this configuration reacts to it. Expected results: the same or close.
- Finding a specialized security forum - I know a couple - and asking some technical things there.
Continue reading...
As of today the UAC has been sent to retirement; also turned off the ''smartscreen'' for Edge which I do not use anyway (Big Bro drew an exclamation mark on the Security page, which I ignored) and it seems that the system has another ''smartscreen'' of its own anyway. To take care of the possible risks and threats (some of them are real) I will run my second line antivirus three times a day, to check for malicious stuff, and also run a specialized adware killer, although it is hard to imagine that I could get malware from the page of my company or internet bank - their IT staff is not dumb either.
Impressions after Day 1 -
- installations are faster because I do not need to react to notifications (although I still see the installer menu); this may not be recommended to absolute beginners because they may accidentally do something they did not want to, but if I have decided to install something there is no need to ask again;
- the Big Bro still polices the system, although he is a little bit less annoying, but just a little bit, like Nikita Khruschev in comparison to Joseph Stalin, one was a lesser jerk then the other but both were jerks;
- all the problems I have described earlier are still there, so the victory over Big Bro has not been won yet - but the process has at least started.
- one suspected program turned out not to be a virus, Big Bro was against downloading it but neither Windows Defender nor my second line antivirus found anything wrong with it.
It seems that the system architects (as far as I understand their way of thinking) 1. are obsessed with total control, 2. think all users are kids who do not know anything (my apologies to the young generation - you actually know more about IT than I do) and 3. there is a total, epic fail of communication between the system builders and the users, like this:
- Big Bro is needed because there are threats! Not recommended!
- Which ones?
- I said threats! Not recommended!
- Can I learn to protect myself from them?
- I said threats! Not recommended!
No wonder that some people find this approach annoying and reject the system (call it a reflex if you want to.)
By the way, 3rd party apps are also ''not recommended''. Although they do require a little bit of caution, so that you do not get a trojan or ransomware instead of what you were looking for, they are easier to use, do not bug you with updates or ads, are not linked to compulsory accounts and some of them are free.
Conclusions after Day 1: A little bit more streamlined system, more easy going for users with some experience, but nothing much has changed.
To be done:
- Finding out AND IMPLEMENTING, SUCCESSFULLY the procedure for disabling Edge (I found it but failed to carry out because of the Big Bro a. k. a. the Great Access Denier)
- Next weekend, a small junkware test (mock infection) - finding a not so bad piece of junkware online and seeing how my older machine - without important data - in this configuration reacts to it. Expected results: the same or close.
- Finding a specialized security forum - I know a couple - and asking some technical things there.
Continue reading...