Just go into msconfig & turn UAC right off. Thats what i've done!
Yes that's what I do when I go out - I don't arm my home security and I leave large notices everywhere so burglars know I'm not at home - OH DEAR!


Just go into msconfig & turn UAC right off. Thats what i've done!
Yes that's what I do when I go out - I don't arm my home security and I leave large notices everywhere so burglars know I'm not at home - OH DEAR!
![]()
Turning UAC off isn't the sign of an experienced or power user, it's the sign of an ignorant user because they clearly don't understand the importance of a layered security model.
Trouble with UAC and people disabling it was always drawn from the fact MS does not understand how layered security model should work. They understand it was important, they saw it working - sudo in Unix/Linux, simple elevation in OSX, but when it came to implementing it, they never understood what it should do and still don't.
User accessing application is not security risk, if program is run with user permission and doesn't enter system libraries or kernel space. Accessing program files/application directory to view files is not system wide security risk. Application writing to users home directory should not be system wide security risk. Accessing graphics, desktop acceleration libraries or changing resolution should not be system wide security risk. Even completely killing user console or desktop and restarting it should never be system wide security risk. And once we agree on that, suddenly comes realisation that there is no game, under the sun, that should ever, in any way, shape, form, ever need to be run as administrator or trigger sudo or equivalent UAC. No program working purely in user space should ever need to be root or Admin - the "master of all" except maybe during installation process if installation is for all users?
The fact there is a shield on game icon on any Windows computer out there , if there is even one single computer out there that requires administrative level and elevated permissions to run what should be self contained, user sandboxed program, then it only proves how insanely far MS is from understanding what layered security model should look like.
Switching off UAC is not as much sign of user ignorance as it is a sign of programmers incompetence. It's ultimately like saying - we couldn't clean up how the system works, and any app can still screw around with kernel and system libraries and kill it, it's just now you have to agree to it before it does. It's a bit like saying "we didn't remove red button that allows anyone to blow up your car, instead we put a plastic cover on it that says "are you sure you want to press it?""
have your antivirus and a firewall and becareful what you install and you be ok
if it's any consolation Dolph, i've turned UAC off because it asks me every time i try and do anything work related with my laptop.
as far as UAC is concerned, the software i use every day is a security risk, which is definitely is, but i need to use it, and the pop-ups cause considerable problems with my other programs, so UAC had to go.
Very constructive
If everyone was as constructive as you the internet would be a better place.![]()
User Account Control isn't about trying to second guess everything the user does. You are obviously doing a lot of tasks that require administrator privileges and / or the applications that you're using are requesting administrator rights which is why UAC is bringing up an elevation dialogue.
UAC isn't showing you an elevation dialogue because it thinks a particular program is a security risk. If that was actually the case then it would be rather self defeating because if a certain program was potentially dangerous then giving it administrator privileges certainly isn't going to help the situation.
As said above, the reason why you're receiving a UAC elevation dialogue is because that particular application is requesting administrator privileges. If an application doesn't need administrator privileges and can run absolutely fine with standard user privileges and yet it's requesting administrator rights, get rid of the application and then write a letter to the developer to get them to start writing their programs correctly.
Also, which programs are you having problems with out of interest?
almost all the programs i use require direct access to the system drive and other associated Disk I/O hardware, and UAC has decided (rightly so) that such access requires Admin priviledges.
software wise, i can't tell most of the bespoke software i use (NDA) but i can tell you that i use VMware Workstation with direct local-network access and translation, and direct disk access on startup. i also use a number of other forensic programs which require a similar level of direct disk access.
Why is that software trying to write to the system folders instead of your user folder though? Properly written software should only be using those folders for installation, so you should only get UAC prompts when installing software, then afterwards you shouldn't be since that software shouldn't be trying to write user data to those folders.
UAC was the first thing i turned off in vista and win 7
this, i think its very annoying.
*Snip*
Mark Russinovich said:Elevations and Security Boundaries:
It’s important to be aware that UAC elevations are conveniences and not security boundaries. A security boundary requires that security policy dictates what can pass through the boundary. User accounts are an example of a security boundary in Windows because one user can’t access the data belonging to another user without having that user’s permission.
Because elevations aren’t security boundaries, there’s no guarantee that malware running on a system with standard user rights can’t compromise an elevated process to gain administrative rights. For example, elevation dialogs only identify the executable that will be elevated; they say nothing about what it will do when it executes. The executable will process command-line arguments, load DLLs, open data files, and communicate with other processes. Any of those operations could conceivably allow malware to compromise the elevated process and thus gain administrative rights.
Mark Russinovich said:Elevated AAM processes are especially susceptible to compromise because they run in the same user account as the AAM user’s standard-rights processes and share the user’s profile. Many applications read settings and load extensions registered in a user’s profile, offering opportunities for malware to elevate. For example, the common control dialogs load Shell extensions configured in a user’s registry key (under HKEY_CURRENT_USER), so malware can add itself as an extension to load into any elevated process that uses those dialogs.
Even processes elevated from standard user accounts can conceivably be compromised because of shared state. All the processes running in a logon session share the internal namespace where Windows stores objects such as events, mutexes, semaphores, and shared memory. If malware knows that an elevated process will try to open and read a specific shared memory object when the process starts, it could create the object with contents that trigger a buffer overflow to inject code into the elevated process. That type of attack is relatively sophisticated, but its possibility prevents OTS elevations from being a security boundary.
The bottom line is that elevations were introduced as a convenience that encourages users who want to access administrative rights to run with standard user rights by default. Users wanting the guarantees of a security boundary can trade off convenience by using a standard user account for daily tasks and Fast User Switching (FUS) to a dedicated administrator account to perform administrative operations. On the other hand, users who want to forgo security in favor of convenience can disable UAC on a system in the User Accounts dialog in the Control Panel, but should be aware that this also disables Protected Mode for Internet Explorer.
Mark Russinovich said:Because elevations and ILs don’t define a security boundary, potential avenues of attack , regardless of ease or scope, are not security bugs. So if you aren’t guaranteed that your elevated processes aren’t susceptible to compromise by those running at a lower IL, why did Windows Vista go to the trouble of introducing elevations and ILs? To get us to a world where everyone runs as standard user by default and all software is written with that assumption.
Without the convenience of elevations most of us would continue to run the way we have on previous versions of Windows: with administrative rights all the time. Protected Mode IE and PsExec’s -l option simply take advantage of ILs to create a sandbox around malware that gets past other security defenses. The elevation and Protected Mode IE sandboxes might have potential avenues of attack , but they’re better than no sandbox at all. If you value security over any convenience you can, of course, leverage the security boundary of separate user accounts by running as standard user all the time and switching to dedicated accounts for unsafe browsing and administrative activities.
Same here and it's never had any detrimental effect, there's a fine line between being secure and paranoia.
UAC was the first thing i turned off in vista and win 7
i did ok with out it since 1995, so its just a pain
i don't get why people turn off UAC, it was a pain in Vista, but you live with it and in Win7 its tweaked down anyway.
Also doing my MS training they recommend that you use your pc as a standard user as default, which i don't do but i do keep UAC on