Pripadne bez IE, gui, ... Dalsi z "hacikov" su profily, oproti ktorym je to certifikovane (viz diskusia na Schneierovom blogu):
The Protection Profile is the embodiment of threats, assumptions, objectives, and requirements defined by an end user.
The Common Access Protection Profile (CAPP) provides for a level of protection which is appropriate for an assumed non-hostile and well-managed user community requiring protection against threats of inadvertent or casual attempts to breach the system security. The profile is not intended to be applicable to circumstances in which protection is required against determined attempts by hostile and well funded attackers to breach system security. The CAPP does not fully address the threats posed by malicious system development or administrative personnel. CAPP-conformant products are suitable for use in both commercial and government environments.
Cize CAPP neni nic extra - "funguje to kym sa tam nepokusa nikto cielene naburat". Zato ovela zaujimavejsi je Role Based Access Control Protection Profile (RBACPP - podrobne popisy profilov sa daju najst na Common Criteria Portal, ale neni to moc zabavne citanie). Neni EAL4 ako EAL4 ;-) System s EAL 4 moze podla ineho hodnotenia (TCSEC) v uplne inych triedach (C1, C2, B1, ...).
Dalsi z OS, ktory ma EAL4 RBACPP certifikaciu, je napr. Trusted Solaris. AFAIK ziadny Windows nema RBACPP certifikaciu. Na druhej strane robit administratora stroja s RBAC neni ziadna sranda (skuste napr. SELinux alebo grsecurity RBAC).