The last virus to get me was "CIH" (it was a big'un back in the late 90's) and I got it from a PC Pro magazine CD-ROM disc (!). It infected all my files and even tried to destroy my BIOS. Nasty piece of work.
Fortunately it was a simple "file replicator" strain of virus for which AV tools were perfectly suited to dealing with back then, and I duly used one, from a MS-DOS boot disk.
Common sense and not clicking on things you don't know not enough for you?
99% of "infections" happen because the user has said it ok for it to happen!
If UAC pops up with this message:
"Norovirus requests permission to anally rape you"
It's normally a give away that you shouldn't allow it access.
UAC isn't a security boundary so shouldn't really be relied upon.
Even "safe" websites have been known to serve up bad stuff from time to time and unfortunately malware generally doesn't ask nicely for permission to install.
So without AV what tips you off that you have a problem? For the less in your face malware of course.
Back to basics, when my parents surf the net.. and my dad looks a dodgy site then who's going to protect him? Superman? No, an anti virus program
Back to basics, when my parents surf the net.. and my dad looks a dodgy site then who's going to protect him? Superman? No, an anti virus program
UAC isn't, no. But Windows NT's security is. And UAC is merely an added convenience on top of that.
UAC simply provides a "split token" that allows an administrator account to operate as a standard user and then partially elevate as and when needed by applications. It also provides cryptographic services by verifying any code signatures on the program you are about to execute which gives the user a greater ability to make an informed decision.
That requires an exploit which generally suggests the victim wasn't up to date with their patches.
Ignorance isn't bliss. That's why I installed Kaspersky on their laptop last year. I'm not an expert. But Updating to an new OS would be a good idea