UAC can be disabled, and when it is, applications in Windows Vista and Windows 7 run as high integrity processes by default.
This changes in Windows 8, if UAC is disabled, your applications will no longer run as a high integrity process, they will run as a medium integrity process.
Applications can request elevation to a high integrity process when UAC is off explicitly and no UAC dialog will be shown.
It's better to have your non malware process run as medium integrity. Sometimes things can be exploited where arbitrary code cannot be executed, but there is still an exploit to be had.
That's a good point though that if you can run arbitrary code through the exploit, then they are equivalent.
Users with accounts that are members of the Administrators group have two security access tokens created at logon that are linked together. One access token is a standard user access token assigned a medium integrity level, which has the Administrators group used for Deny access checks only, and certain administrative privileges removed. The second access token is a full-privilege, elevated-access token that is assigned a high integrity level because the Administrators group and administrative privileges are present in the access token.
It's still not running as admin, so I'm no sure what you're getting at. It just means if the applications requests to run as admin it bypasses the UAC pop up and does it automatically. That isn't running as admin. :/
Anyway, anyone got any ideas about my issue?
It's still not running as admin, so I'm no sure what you're getting at. It just means if the applications requests to run as admin it bypasses the UAC pop up and does it automatically. That isn't running as admin. :/
UAC is off.
TS PTT doesn't work when a game is maximised.
If I run it as admin it does.
I don't belive apps run as admin if UAC is off tbh.