WSC(Windows 脚本组件)模型的安全性如何?
- WSC 的安全性如何?
- 它是否始终假设它在受信任的环境中运行?
- 这项技术会持续存在吗?还是说微软有可能很快就会消灭它?
- How secure is WSC?
- Does it always assume that it's running in a trusted environment?
- Will the technology persist or is there the chance that MS will kill it sometime soon?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
WSC 在调用它们的代码帐户下运行。我在 IIS 中大量使用它们,在我的例子中它们作为匿名 Internet 用户运行。
如果您从脚本调用它们,它们将在与调用脚本相同的帐户下运行。请注意,当您从 IIS 调用它们时,它们使用 Windows 系统区域设置,而不是网站区域设置,因此它们在 Windows 上下文下运行,而不是在 IIS 下运行。因此,如果您从 IIS 运行日期时间和小数分隔符而不传递区域设置,您可能会看到奇怪的事情发生。
MS 杀死它们的机会是存在的,但可能性不大,它们是微软脚本技术,利用 MS 脚本引擎,所以我希望只要微软支持运行经典 ASP(基于相同的技术) WSC 也仍然有效。
有很多经典的asp网站仍在生产中,还有很多基于微软脚本技术的脚本,所以我认为它们在未来几年内不会消失。
WSC's run under the account of the code that invokes them. I use them heavily in IIS and they run as the anonymous internet user in my case.
If you call them from a script, they run under the same account as the calling script. Please beware that when you call them from IIS, they use the Windows system locale, not the website locale, so they do run under the Windows context, and not under IIS. So you might see strange things happening with datetimes and the decimal separator if you run them from IIS without passing the locale along.
The chance of MS killing them off is present, but not very likely, they are a microsoft scripting technology, making use of the MS scripting engine, so I expect as long as Microsoft supports running classic ASP (which is based on the same technology) WSC's will also still work.
There are a lot of classic asp sites still in production, aswell as a lot of scripts based on Microsofts scripting technology, so I don't think they'll disappear in the next few years.