#4 - "Microsoft doesn't want to confine .NET developers to the sandbox. Fine. But this allows for viruses to spread that utilize parts of the .NET framework."
While Microsoft doesn't want to define a sandbox *for* you, there is nothing to prevent the definition of a sandbox by the user and system administrators. With .NET, MS gives you the option of changing how the default sandbox works, giving the power to the user/admin, not Microsoft.
The default settings for the pseudo-sandbox MS includes is quite restricting, and should prevent the spread of virii just as well as the Java sandbox. The point is, once Windows is 100% .NET driven, many of these virus problems will start to disappear thanks to the whole paradigm of code access security.
#6 - true, but the point is that the reason the majority of virii spread is because the user doesn't know any better. With code access security, the default setting is to not allow programs downloaded from the Internet to access files or resources outside of the default sandbox, just like in Java. The great part about .NET is that, unlike Java, the programmer can request certain specific permissions which can be granted or denied by the admin/user.
The administration of these features is very clear and easy, but not obvious. In this way, it protects "Mom and Pop" from doing something stupid - .NET protects them with the default sandbox. In a business environment, the sys admins can change settings in any way imaginable to allow applications they trust (like from a specific company or author) to run with more permissions than the default sandbox.
|