![]() |
![]() |
#1 |
2×17×197 Posts |
![]()
I work at the University of Georgia math department, where we have a serious problem with our classroom computers running prime95. This ties up the machine, making it virtually impossible to run demonstrations for our lectures during class. In addition, the software bypasses install permissions and puts itself in a hidden folder.
I don't mind the idea of people donating their own computers to a joint computing project, but I think that you're crossing the line when your software hides itself. Why not have the software install itself in the usual way (requiring permission) in a non-hidden folder? If you don't even have admin status on a machine, you are probably NOT the person who should be volunteering that machine for GIMPS. |
![]() |
![]() |
#2 |
"Jacob"
Sep 2006
Brussels, Belgium
23×227 Posts |
![]()
Prime95 does not come with an installer nowadays. It used to have that feature a long time ago. Anyway it never installed in a hidden folder. Unless explicitly specified (and bypassing a warning) it runs at the lowest priority and thus does not tie up the machine.
I think you have a problem with someone who has administrative rights on those machines and has been carried away trying to perform more work. As you could see on this forum if you took the time, this kind of behaviour is strongly discouraged. Jacob |
![]() |
![]() |
![]() |
#3 | ||
"Richard B. Woods"
Aug 2002
Wisconsin USA
769210 Posts |
![]() Quote:
Some of the behaviors you're seeing on your UofG systems are NOT typical of GIMPS software. Someone who installed that software has gone beyond the default (and recommended) GIMPS methods. If GIMPS software is running at any priority other than the lowest, it's because someone has disregarded GIMPS's defaults by specifying a higher priority, against our recommendations. I think we would fully support UofG's stopping and uninstalling any GIMPS software that, because of nonrecommended installation, is interfering with legitimate class work. Quote:
I think I can speak for us in: We fully agree, and expect, that our software should be installed as you say -- "in the usual way (requiring permission) in a non-hidden folder". It is NOT GIMPS's policy or procedure to install its software in any "hidden" manner or to bypass permissions. GIMPS is above-board, not sneaky in any way. We cannot prevent someone from installing GIMPS software in an unapproved method, but our documentation opposes that, and we'd be happy to help you rectify the situation. - - - - George, Can prime95 detect whether it is installed in a hidden folder? Or detect other ways in which it has been installed or executed in a disapproved manner? If so, how about adding that detection and refusing to run when such things are detected? Last fiddled with by cheesehead on 2010-11-15 at 22:14 |
||
![]() |
![]() |
![]() |
#4 | |
P90 years forever!
Aug 2002
Yeehaw, FL
73·23 Posts |
![]() Quote:
If the person who installed prime95 on these machines had gotten proper permission to do so, he'd probably want to install prime95 this way so that casual machine users don't accidentally or willfully mess up the installation. |
|
![]() |
![]() |
![]() |
#5 |
"Richard B. Woods"
Aug 2002
Wisconsin USA
170148 Posts |
![]()
Unregistered,
As I noted, I'm not a GIMPS administrator. George ("Prime95") Woltman's advice supersedes mine. |
![]() |
![]() |
![]() |
#6 | |
P90 years forever!
Aug 2002
Yeehaw, FL
73×23 Posts |
![]() Quote:
We're sorry you've run into a student that doesn't understand the implications of what he is doing. |
|
![]() |
![]() |
![]() |
#7 |
6809 > 6502
"""""""""""""""""""
Aug 2003
101×103 Posts
244558 Posts |
![]()
As a 'lay user', it sounds like they have selected a work type and settings that are not advised for machines that need to be responsive. P-1 work type with high memory usage is ok for when the machine does not need to be responsive (like at night). That is generally the only thing that would make 'demonstrations' impossible. The major other thing would be even more ill advised, playing with the priority status of Prime95.
|
![]() |
![]() |
![]() |
#8 |
23×937 Posts |
![]()
Dear GIMPS folks,
Thanks for your helpful comments! (Sorry about the annoyed tone of my first post on this.) Obviously, I don't know too much about GIMPS (or, to be honest, Windows-- I'm a Mac and Linux programmer). But is it possible to require Windows authentication before selecting the "P-1 work type" (or, generally speaking, before running prime95 at a priority other than lowest?). I could imagine that a legit user on a "public" machine might want to run hidden or without a tray icon. We could live with this as long as such an install had to either: 1) require an admin password on the machine or 2) run at lowest priority It's really the combination which is killing us. I know that the user shouldn't have done this, but I humbly submit that it's still at some level your program and hence your problem: I strongly suspect that my problem user does not read your forums and does not know (or does not care) that their behavior is "strongly discouraged". |
![]() |
![]() |
#9 | ||
6809 > 6502
"""""""""""""""""""
Aug 2003
101×103 Posts
244558 Posts |
![]() Quote:
Quote:
|
||
![]() |
![]() |
![]() |
#10 |
Jun 2003
15310 Posts |
![]()
Unregistered,
I've been a Prime95 participant for just over 11 years and yours is the first complaint of this type that I have ever seen. I'm only mentioning this fact because your suggestion(s) sound rational, practical, and very doable to me (especially requiring an admin password to change the priority) and I wanted to explain why your suggestions weren't already in effect. It is of course, George Woltman's call, and I am sure that he will respond as soon as he notices the updates to this thread. By the way, several university math departments (e.g. UCLA, Univ. of Central Missouri, Northeastern State Univ. (OK), etc.) run Prime95 as a way of testing and making sure that the PCs in their labs are performing properly. I'll bet that the Univ. of Georgia could give these other schools a "real run for their money". Last fiddled with by RMAC9.5 on 2010-11-18 at 06:49 |
![]() |
![]() |
![]() |
#11 | ||
"Richard B. Woods"
Aug 2002
Wisconsin USA
22×3×641 Posts |
![]()
It was quite understandable -- but see below about whom you should really be discussing this with instead of us.
Quote:
If a user with the required authority doesn't realize (or care) what the consequences are, prime95 can't stop him/her. Your school, not prime95, grants those authorities to users. Quote:
Please take a moment to shift to a realistic point of view. Does your home's security depend on getting all possible intruders to voluntarily agree not to trespass? Or do you have locks on your doors? Does your school have locks on its doors? Your school should have an effective and enforced policy that prevented folks from installing software on your systems without sufficient permission -- that would protect your school against other software, not just prime95. If your school currently has no way of preventing users from installing unauthorized software, what protection does it have against software that's far, far more malicious than prime95? Suppose we satisfy all your security requests for prime95 -- How does that protect your school's systems from the million-and-one other pieces of software out there? Your school's computer security should not depend on the good will of software writers!!!!! If it has no way of preventing prime95 from being installed in a manner that bothers your systems' performance, then it has no way of preventing installation of viruses, Trojans, worms, or other malware. You should not be seeking security from us. You should be seeking it from your own school's administration!!! (My guess is that you don't have actual computer security experience, or else you'd have known that all along, and not be asking us to solve your problem. You need to be discussing this with your school's computer security people, not with us.) Last fiddled with by cheesehead on 2010-11-18 at 08:39 |
||
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Nuke attack - run or hide? | MooMoo2 | Soap Box | 40 | 2018-01-19 23:48 |
suggestion: ability to hide inactive CPUs | ixfd64 | PrimeNet | 0 | 2011-01-06 00:46 |
Please hide the secet forum | wblipp | Forum Feedback | 0 | 2007-03-31 20:43 |
How to hide icon in system tray? | ccstpaul | Software | 2 | 2006-04-12 03:50 |
Strategies to Hide the NEXT Mersenne Prime | nitro | Lounge | 27 | 2003-12-05 13:06 |