Showing results for Other - The Old New Thing

May 19, 2004
0
0

Beware the hash reset attack

Raymond Chen
Raymond Chen

There are a variety of message digest algorithms out there, MD5 being a particularly popular one. These generate a "message digest" (essentially, a hash) so you can detect whether somebody has tampered with a file, the theory being that it's hard to tamper with a file without changing its hash. But make sure you record the file size as well as t...

Other
May 17, 2004
0
0

When do you put … after a button or menu?

Raymond Chen
Raymond Chen

When do you put "..." after a button or menu? For example, some menus say "Save as..." and some buttons say "Customize...". What is the rule for dots? Many people believe that the rule for dots is "If it's going to display a dialog, then you need dots." This is a misapprehension. The rules are spelled out in the Windows User Interface D...

Other
May 14, 2004
0
0

When do you disable an option and when do you remove it?

Raymond Chen
Raymond Chen

When you're displaying a menu item or a dialog option, and the option is not available, you can either disable it or you can remove it. What is the rule for deciding which one to do? Experiments have shown that if something is shown but disabled, users expect that they will be able to get it enabled if they tinker around enough. So leave a...

Other
May 13, 2004
0
0

Thinking through a feature

Raymond Chen
Raymond Chen

The commentary after my entry on taskbar grouping drifted into people asking for still more features in taskbar grouping. Writing the code is the easy part. Designing a feature is hard. You have several audiences to consider. It's not just about the alpha geeks; you have to worry about the grandmothers, the office workers, the IT dep...

Other
May 12, 2004
0
0

Is your web site an open relay?

Raymond Chen
Raymond Chen

As if there isn't enough to worry about. Everyone knows about the dangers of open SMTP relays. But how many people realize the dangers of an open HTTP relay? Many web sites do arbitrary redirection. If I were a spammer, I could create a link to myself that redirects through some well-known web sites, thereby granting my spam link false aut...

Other
May 7, 2004
0
0

Image File Execution Options

Raymond Chen
Raymond Chen

Hereby incorporating by reference Junfeng Zhang's discussion of the Image File Execution Options registry key.

Other
May 6, 2004
0
0

Scripting is a two-edged sword

Raymond Chen
Raymond Chen

A three line VB script will disable your firewall. The advantage of scripting is that you can control so many things with just a few lines of code. The disadvantage of scripting is that bad people can control so many things with just a few lines of code. I wonder how long it will be before there's a virus that disables the firewall.

Other
May 4, 2004
0
0

Is open source the new monoculture?

Raymond Chen
Raymond Chen

Okay I know I'm going to get into a lot of trouble for even bringing up this topic... This past weekend, Ulf Harnhammar discovered two buffer overflow and two directory traversal vulnerabilities in LHA, a library of data compression functions. Since the code for this is public, it has been copied all over the place. At least one commerc...

Other
Apr 30, 2004
0
0

Where does the taskbar get grouped button icons from?

Raymond Chen
Raymond Chen

Follow-up question to Where does the taskbar get grouped button titles from?: Where does the taskbar get grouped button icons from? The icon for grouped taskbar buttons comes from the icon for the underlying EXE, the same icon that appears when you open the folder that the EXE resides in and scroll down to the EXE. For example, if you ha...

Other