Hi malware fighters,
It crashes on Vista and crashed on 64-bits. From Redmond the reactions were amazement and trying to ridicule it. On his blog MS-developer Brandon Paddock says he see the function as a trick, purely meant to start up a developer's environment. The folder is not meant to be accessed directly, but is a 'All Tasks'-folder, a start-off for developers (and malcreants - added by me).
Every name can be given to this folder, it is just the unique ID to it, the so-called Class ID (CLSID). He warns there is not official functionality and no one can trust it to do that for whatever purpose".
Paddock just plays the discovery of it down with saying the normal Configuration Screen has similar functionality, but then visualized as well, better to enable navigation.
Well you still have to authenticate with a password...But what is the unspecified feature doing there - and what or who are better denied access there? Security through obscurity....leaving the user unaware as what goes on under the hood...
Other examples:
Network.Map.{E7DE9B1A-7533-4556-9484-B26FB486475E}
Personalization.{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}
And I would not be surprised the functionality has left us after the next patch-round...
But I do not like the word G*dmode - just to call an Easter egg in the closed software that -
Then under W 7 you can execute *whatever* program as an administrator, Just right click on a shortcut and choose "Execute as admin" from the context menu. In such a way, unhindered by any form of common senseone can install all and every form of malicious software *systemwide* with full admin rights.
So I think the issue is hyped and just dished up to fill long threads on forums,
polonus