勃起是什么| 前列腺有什么症状| 排场是什么意思| 梦见好多猪肉是什么意思| 腿麻是什么病的前兆吗| 刘备和刘邦是什么关系| 一夜白头是什么原因| 木丑念什么| 肚子胀是什么原因引起的| 塔罗牌是什么| 1945年是什么年| 宜余事勿取是什么意思| 宫颈炎是什么| 什么的风儿| 僵尸车是什么意思| 梦见大胖小子是什么意思| 增肌是什么意思| 炖大骨头放什么调料| 子宫腺肌症吃什么药最有效| 经是什么意思| 经常流鼻血是什么原因| 节度使是什么意思| 托马斯是什么意思| 手足口是什么| 尿道炎吃什么药| 曲率是什么意思| 口水臭什么原因| 功能是什么意思| plus是什么意思| hoka是什么牌子| 韩束适合什么年龄段的人用| 性行为是什么意思| 霉菌感染用什么药| 腋下出汗是什么原因| 前降支中段心肌桥什么意思| 头发粗硬是什么原因| 捋是什么意思| 什么叫放疗| 什么是沉没成本| 五心烦热是什么意思| 根是什么意思| kangol是什么牌子| 孩子爱流鼻血是什么原因| 左下腹部是什么器官| 湿温病是什么症状| 甘油三酯高吃什么食物| 正月初九是什么星座| 什么时候说什么话| 脑血栓前兆是什么症状表现| 空调什么时候发明的| 吃什么补黄体酮| 嘴发苦是什么原因| 交感神经型颈椎病吃什么药| 血红蛋白低吃什么可以补起来| 朝鲜人一日三餐吃什么| 为什么恐龙会灭绝| 薜丁山是什么生肖| 谷氨酰转移酶高是什么病| 睡觉流口水吃什么药| 吃了拉肚子的药叫什么| 植物神经紊乱用什么药| 胸部痛是什么原因| 什么麻料最好| 白细胞减少吃什么药| 腺体鳞化是什么意思| 吃b族维生素有什么好处| 睡眠瘫痪症是什么| 什么什么有力| 什么是高原反应| 跳跳糖为什么会跳| 膀胱炎吃什么药最见效| cp1是什么意思| 煲汤放什么药材补气血| 喝什么酒容易醉| 天秤和什么星座最配| 女生月经迟迟不来是什么原因| 乳腺增生看什么科室| 人生于世上有几个知己是什么歌| 黄鼠狼的天敌是什么动物| 男人射精快什么原因| 黑豆熟地水功效是什么| 双肺索条灶是什么意思| 与时俱进是什么意思| 体脂率是什么| 角质是什么意思| 落选是什么意思| 世袭罔替什么意思| 支原体感染是什么引起的| 鸡蛋干配什么菜炒好吃| 百福图挂在家里什么位置好| 便秘吃什么菜| 什么零食热量低有利于减肥| clot什么牌子| 气阴两虚吃什么药| 海洋中最大的动物是什么| 牛奶什么时候喝好| 等闲之辈是什么意思| 中药地龙是什么| 为什么男怕属鸡| 孕妇不能吃什么| 喉咙不舒服挂什么科| 甲状腺结节吃什么食物好| 月经提前十天是什么原因| 梦见迁祖坟有什么预兆| 缺钾最忌讳吃什么| 蛇什么时候出来活动| 一月19日是什么星座| 什么的毛主席| 养小鬼是什么意思| 一个日一个斤念什么| 二甲医院是什么意思| 脱发厉害是什么原因引起的| 胆水是什么| 痘痘里面挤出来的白色东西是什么| 为什么金生水| 什么药退烧快| soleil是什么意思| 澳门是什么时候回归的| w代表什么单位| 公务员辞职做什么| 溜达鸡是什么意思| 什么是文员| 经常手淫对身体有什么危害| 2003年五行属什么| 下午3点半是什么时辰| 头发多剪什么发型好看| romantic什么意思| hope是什么意思啊| 苦荞是什么| 小腿肚子抽筋是什么原因| 香菇配什么菜炒着好吃| py交易是什么意思| 补办结婚证需要什么手续| 精子为什么是黄色的| 阿魏酸是什么| media是什么意思| 囊性病变是什么意思| 殿试是什么意思| 年抛是什么意思| 画地为牢下一句是什么| 吃什么补蛋白最快| 增强抵抗力吃什么| 尿频尿急尿不尽吃什么药| 淋巴结肿大是什么引起的| 遂什么意思| 纳呆是什么意思| 女性解脲支原体阳性是什么意思| mys是什么意思| 俏皮话是什么意思| 徘徊是什么意思| 梦见下大雪是什么预兆| 什么人不适合去高原| 包皮垢是什么| spo2过低是什么意思| 白细胞偏高说明什么| 神经紊乱有什么症状| 天生丽质难自弃是什么意思| 腺样体肥大有什么症状| 黄龙玉产地在什么地方| 惊艳是什么意思| 74年属什么的生肖| 尿道感染流脓吃什么药| 在什么的前面用英语怎么说| 什么是铅| 加盟什么品牌好| 梦见青蛙是什么预兆| 人流是什么意思| 社康是什么| 2009年什么年| 天河水命是什么意思| 去乙酰毛花苷又叫什么| 直肠炎有什么症状| 扁桃体发炎用什么药| 又当又立是什么意思| 三八线是什么意思| 铅是什么| 鱼腥草与什么相克| 做四维需要准备什么| 顺其自然是什么意思| 清新的什么填空| 腿困是什么原因引起的| 脚肿什么原因| 福兮祸兮是什么意思| 腺样体面容是什么意思| 长期不过性生活有什么危害| 公鸡为什么会打鸣| 眼睛出血是什么原因| 八月十日是什么星座| 绿豆和什么相克中毒| 暨怎么读什么意思| 尿hcg阳性是什么意思| 嘚儿是什么意思| 办港澳通行证需要带什么| who是什么组织| 小金人车标是什么车| 嗓子疼咳嗽是什么原因| 红参适合什么人吃| 勾践属什么生肖| 晚上睡觉老做梦是什么原因| 结肠是什么病| nyc是什么牌子| 莴笋什么时候种植| 胃气胃胀吃什么药最好| 芒硝是什么| 登对是什么意思| 吃火龙果有什么好处和坏处| 手抖吃什么药| 脚酸是什么原因引起的| prp治疗是什么意思| 血小板平均体积偏高是什么意思| 欲壑难填是什么意思| 红绳有什么寓意| 大运正官是什么意思| 胃溃疡吃什么药| 脚后跟痛是什么问题| 霉菌阴道炎是什么引起的| 三问表是什么意思| 睡觉多梦是什么原因| 病种是什么意思| 胎盘成熟度1级是什么意思| 子宫内膜异位症是什么意思| 什么目什么身| 血压低什么症状| 一什么冰箱| 取环后需要注意什么| 天生一对成伴侣是什么生肖| 眼睑痉挛挂什么科| 成人睡觉磨牙是什么原因| 天上的星星为什么会发光| 患得患失什么意思| 左是什么结构| 灭蚂蚁什么药最有效| 1937年是什么年| 刹那芳华是什么意思| 香叶是什么树叶| 尔尔是什么意思| 硫黄和硫磺有什么区别| 脑梗用什么药效果好| 30周做什么检查| 当归什么味道| 凌志和雷克萨斯有什么区别| tps是什么意思| 结婚20年是什么婚姻| 银花有焰万家春是什么生肖| 避孕套和安全套有什么区别| 支气管炎不能吃什么| 舌苔黄腻吃什么中成药| 扁平息肉属于什么性质| 谨言是什么意思| 女性放屁多是什么原因| 毛泽东什么时候死的| 质询是什么意思| 梦见抽血是什么预兆| 着凉肚子疼吃什么药| 缓解是什么意思| 2006属狗的五行缺什么| 16年属什么生肖| 更年期潮热出汗吃什么药| 嗜是什么意思| 天德合是什么意思| 1为什么读yao| 什么是便秘| 拔牙后吃什么恢复快| 梦见自己搬家是什么意思| 百度Jump to content

缓解“压力肥”先管住嘴

From Wikipedia, the free encyclopedia
User Account Control in Windows 10
User Account Control "Windows Security" alerts in Windows 11 in light mode. From top to bottom: blocked app, app with unknown publisher, app with a known/trusted publisher.
百度 ”“我国仍然处于重要战略机遇期,前景十分光明,挑战也十分严峻。

User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista[1] and Windows Server 2008 operating systems, with a more relaxed[2] version also present in the versions after Vista, being Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorises an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges and malware are kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorises it.

UAC uses Mandatory Integrity Control to isolate running processes with different privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes from each other.[3] One prominent use of this is Internet Explorer 7's "Protected Mode".[4]

Operating systems on mainframes and on servers have differentiated between superusers and userland for decades. This had an obvious security component, but also an administrative component, in that it prevented users from accidentally changing system settings.

Early Microsoft home operating-systems (such as MS-DOS and Windows 9x) did not have a concept of different user-accounts on the same machine. Subsequent versions of Windows and Microsoft applications encouraged the use of non-administrator user-logons, yet some applications continued to require administrator rights. Microsoft does not certify applications as Windows-compliant if they require administrator privileges; such applications may not use the Windows-compliant logo with their packaging.

Behavior in Windows versions

[edit]
  • Windows 1.03.11 and Windows 9x: all applications had privileges equivalent to the operating system;
  • All versions of Windows NT up to, and including, Windows XP and Windows Server 2003: introduced multiple user-accounts, but in practice most users continued to function as an administrator for their normal operations. Further, some applications would require that the user be an administrator for some or all of their functions to work.[5]
  • Windows Vista and Windows Server 2008: Microsoft developed Vista security firstly from the Limited User Account (LUA), then renamed the concept to User Account Protection (UAP) before finally shipping User Account Control (UAC).[6] Introduced in Windows Vista, User Account Control (UAC) offers an approach to encourage "super-user when necessary". The key to UAC lies in its ability to elevate privileges without changing the user context (user "Bob" is still user "Bob"). As always, it is difficult to introduce new security features without breaking compatibility with existing applications.
    • When someone logs into Vista as a standard user, the system sets up a logon session and assigns a token containing only the most basic privileges. In this way, the new logon session cannot make changes that would affect the entire system.
    • When a person logs in as a user with membership in the Administrators group, the system assigns two separate tokens: the first token contains all privileges typically awarded to an administrator, and the second is a restricted token similar to what a standard user would receive.
      • User applications, including the Windows Shell, then start with the restricted token, resulting in a reduced-privilege environment – even when running under an Administrator account.
      • When an application requests higher privileges or when a user selects a "Run as administrator" option, UAC will prompt standard users to enter the credentials of an Administrator account and prompt Administrators for confirmation and, if consent is given, continue or start the process using an unrestricted token.[7]
  • Windows 7 and Windows Server 2008 R2: Microsoft included a user interface to change User Account Control settings, and introduced one new notification mode: the default setting. By default, UAC does not prompt for consent when users make changes to Windows settings that require elevated permission through programs stored in %SystemRoot% and digitally signed by Microsoft. Programs that require permission to run still trigger a prompt. Other User Account Control settings that can be changed through the new UI could have been accessed through the registry in Windows Vista.[8]
  • Windows 8/8.1 and Windows Server 2012/R2: add a design change. When UAC is triggered, all applications and the taskbar are hidden when the desktop is dimmed.
  • Windows 10 and Windows Server 2016-2022: early versions have the same layout as Windows 8 and 8.1. The Anniversary Update (including Windows Server 2016, which is based on said update) adds a more modern look, along with support for dark mode. Also, Windows 10 adds support for Windows Hello in the User Account Control dialog box.
  • Windows 11 and Windows Server 2025: has mostly the same layout as in later versions of Windows 10, but with visual changes that match the rest of the operating system's new look and feel.

Tasks that trigger a UAC prompt

[edit]

Tasks that require administrator privileges will trigger a UAC prompt (if UAC is enabled); they are typically marked by a security shield icon with the 4 colors of the Windows logo (in Vista and Windows Server 2008) or with two panels yellow and two blue (Windows 7, Windows Server 2008 R2 and later). In the case of executable files, the icon will have a security shield overlay. The following tasks require administrator privileges:[9][10]

  • Running an Application as an Administrator
  • Changes to system-wide settings
  • Changes to files in folders that standard users don't have permissions for (such as %SystemRoot% or %ProgramFiles% in most cases)
  • Changes to an access control list (ACL), commonly referred to as file or folder permissions
  • Installing and uninstalling applications outside of:
    • The %USERPROFILE% (e.g. C:\Users\{logged in user}) folder and its sub-folders.
      • Most of the time this is in %APPDATA%. (e.g. C:\Users\{logged in user}\AppData), by default, this is a hidden folder.
        • Chrome's and Firefox's installer ask for admin rights during install, if given, Chrome will install in the Program Files folder and be usable for all users, if denied, Chrome will install in the %APPDATA% folder instead and only be usable by the current user.
    • The Microsoft Store.
    • The folder of the installer and its sub-folders.
      • Steam installs its games in the /steamapps/ sub-folder, thus not prompting UAC. Some games require prerequisites to be installed, which may prompt UAC.
  • Installing device drivers
  • Installing ActiveX controls
  • Changing settings for Windows Firewall
  • Changing UAC settings
  • Configuring Windows Update
  • Adding or removing user accounts
  • Changing a user's account name or type
  • Turning on Guest account (Windows 7 to 8.1)
  • Turning on network discovery, file and printer sharing, Public folder sharing, turning off password protected sharing or turning on media streaming
  • Configuring Parental Controls (in Windows 7) or Family Safety (Windows 8.1)
  • Running Task Scheduler
  • Backing up and restoring folders and files
  • Merging and deleting network locations
  • Turning on or cleaning logging in Remote Access Preferences
  • Running Color Calibration
  • Changing remote, system protection or advanced system settings
  • Restoring backed-up system files
  • Viewing or changing another user's folders and files
  • Running Disk Defragmenter, System Restore or Windows Easy Transfer (Windows 7 to 8.1)
  • Running Registry Editor
  • Running the Windows Experience Index assessment
  • Troubleshoot audio recording and playing, hardware / devices and power use
  • Change power settings, turning off Windows features, uninstall, change or repair a program
  • Change date and time and synchronizing with an Internet time server
  • Installing and uninstalling display languages
  • Change Ease of Access administrative settings

Common tasks, such as changing the time zone, do not require administrator privileges[11] (although changing the system time itself does, since the system time is commonly used in security protocols such as Kerberos). A number of tasks that required administrator privileges in earlier versions of Windows, such as installing critical Windows updates, no longer require administrator privileges in Vista.[12] Any program can be run as administrator by right-clicking its icon and clicking "Run as administrator", except MSI or MSU packages as, due to their nature, if administrator rights will be required a prompt will usually be shown. Should this fail, the only workaround is to run a Command Prompt as an administrator and launch the MSI or MSP package from there.

Features

[edit]

User Account Control asks for credentials in a Secure Desktop mode, where the entire screen is temporarily dimmed, Windows Aero disabled, and only the authorization window at full brightness, to present only the elevation user interface (UI). Normal applications cannot interact with the Secure Desktop. This helps prevent spoofing, such as overlaying different text or graphics on top of the elevation request, or tweaking the mouse pointer to click the confirmation button when that's not what the user intended.[13] If an administrative activity comes from a minimized application, the secure desktop request will also be minimized so as to prevent the focus from being lost. It is possible to disable Secure Desktop, though this is inadvisable from a security perspective.[14]

In earlier versions of Windows, Applications written with the assumption that the user will be running with administrator privileges experienced problems when run from limited user accounts, often because they attempted to write to machine-wide or system directories (such as Program Files) or registry keys (notably HKLM).[5] UAC attempts to alleviate this using File and Registry Virtualization, which redirects writes (and subsequent reads) to a per-user location within the user's profile. For example, if an application attempts to write to a directory such as "C:\Program Files\appname\settings.ini" to which the user does not have write permission, the write will be redirected to "C:\Users\username\AppData\Local\VirtualStore\Program Files\appname\settings.ini". The redirection feature is only provided for non-elevated 32-bit applications, and only if they do not include a manifest that requests specific privileges.[15]

There are a number of configurable UAC settings. It is possible to:[16]

  • Require administrators to re-enter their password for heightened security,
  • Require the user to press Ctrl+Alt+Del as part of the authentication process for heightened security;
  • Disable only file and registry virtualization[17]
  • Disable Admin Approval Mode (UAC prompts for administrators) entirely; note that, while this disables the UAC confirmation dialogs, it does not disable Windows' built-in LUA feature, which means that users, even those marked as administrators, are still limited users with no true administrative access.

Command Prompt windows that are running elevated will prefix the title of the window with the word "Administrator", so that a user can discern which instances are running with elevated privileges.[18]

A distinction is made between elevation requests from a signed executable and an unsigned executable; and if the former, whether the publisher is 'Windows Vista'. The color, icon, and wording of the prompts are different in each case; for example, attempting to convey a greater sense of warning if the executable is unsigned than if not.[19]

Internet Explorer 7's "Protected Mode" feature uses UAC to run with a 'low' integrity level (a Standard user token has an integrity level of 'medium'; an elevated (Administrator) token has an integrity level of 'high'). As such, it effectively runs in a sandbox, unable to write to most of the system (apart from the Temporary Internet Files folder) without elevating via UAC.[7][20] Since toolbars and ActiveX controls run within the Internet Explorer process, they will run with low privileges as well, and will be severely limited in what damage they can do to the system.[21]

Requesting elevation

[edit]

A program can request elevation in a number of different ways. One way for program developers is to add a requestedPrivileges section to an XML document, known as the manifest, that is then embedded into the application. A manifest can specify dependencies, visual styles, and now the appropriate security context:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
    <security>
      <requestedPrivileges>
        <requestedExecutionLevel level="highestAvailable" />
      </requestedPrivileges>
    </security>
  </trustInfo>
</assembly>

Setting the level attribute for requestedExecutionLevel to "asInvoker" will make the application run with the token that started it, "highestAvailable" will present a UAC prompt for administrators and run with the usual reduced privileges for standard users, and "requireAdministrator" will require elevation.[22] In both highestAvailable and requireAdministrator modes, failure to provide confirmation results in the program not being launched.

An executable that is marked as "requireAdministrator" in its manifest cannot be started from a non-elevated process using CreateProcess(). Instead, ERROR_ELEVATION_REQUIRED will be returned. ShellExecute() or ShellExecuteEx() must be used instead. If an HWND is not supplied, then the dialog will show up as a blinking item in the taskbar.

Inspecting an executable's manifest to determine if it requires elevation is not recommended, as elevation may be required for other reasons (setup executables, application compatibility). However, it is possible to programmatically detect if an executable will require elevation by using CreateProcess() and setting the dwCreationFlags parameter to CREATE_SUSPENDED. If elevation is required, then ERROR_ELEVATION_REQUIRED will be returned.[23] If elevation is not required, a success return code will be returned at which point one can use TerminateProcess() on the newly created, suspended process. This will not allow one to detect that an executable requires elevation if one is already executing in an elevated process, however.

A new process with elevated privileges can be spawned from within a .NET application using the "runas" verb. An example using C#:

System.Diagnostics.Process proc = new System.Diagnostics.Process();
proc.StartInfo.FileName = "C:\\Windows\\system32\\notepad.exe";
proc.StartInfo.Verb = "runas"; // Elevate the application
proc.StartInfo.UseShellExecute = true;
proc.Start();

In a native Win32 application the same "runas" verb can be added to a ShellExecute() or ShellExecuteEx() call:[7]

ShellExecute(hwnd, "runas", "C:\\Windows\\Notepad.exe", 0, 0, SW_SHOWNORMAL);

In the absence of a specific directive stating what privileges the application requests, UAC will apply heuristics, to determine whether or not the application needs administrator privileges. For example, if UAC detects that the application is a setup program, from clues such as the filename, versioning fields, or the presence of certain sequences of bytes within the executable, in the absence of a manifest it will assume that the application needs administrator privileges.[24]

Security

[edit]

UAC is a convenience feature; it neither introduces a security boundary nor prevents execution of malware.[25][26][27][28]

Leo Davidson discovered that Microsoft weakened UAC in Windows 7 through exemption of about 70 Windows programs from displaying a UAC prompt and presented a proof of concept for a privilege escalation.[29]

Stefan Kanthak presented a proof of concept for a privilege escalation via UAC's installer detection and IExpress installers.[30]

Stefan Kanthak presented another proof of concept for arbitrary code execution as well as privilege escalation via UAC's auto-elevation and binary planting.[31]

Criticism

[edit]

There have been complaints that UAC notifications slow down various tasks on the computer such as the initial installation of software onto Windows Vista.[32] It is possible to turn off UAC while installing software, and re-enable it at a later time.[33] However, this is not recommended since, as File & Registry Virtualization is only active when UAC is turned on, user settings and configuration files may be installed to a different place (a system directory rather than a user-specific directory) if UAC is switched off than they would be otherwise.[14] Also Internet Explorer 7's "Protected Mode", whereby the browser runs in a sandbox with lower privileges than the standard user, relies on UAC; and will not function if UAC is disabled.[20]

Yankee Group analyst Andrew Jaquith said, six months before Vista was released, that "while the new security system shows promise, it is far too chatty and annoying."[34] By the time Windows Vista was released in November 2006, Microsoft had drastically reduced the number of operating system tasks that triggered UAC prompts, and added file and registry virtualization to reduce the number of legacy applications that triggered UAC prompts.[5] However, David Cross, a product unit manager at Microsoft, stated during the RSA Conference 2008 that UAC was in fact designed to "annoy users," and force independent software vendors to make their programs more secure so that UAC prompts would not be triggered.[35] In response to these criticisms, Microsoft altered UAC activity in Windows 7. For example, by default users are not prompted to confirm many actions initiated with the mouse and keyboard alone such as operating Control Panel applets.

In a controversial article, New York Times Gadgetwise writer Paul Boutin said "Turn off Vista's overly protective User Account Control. Those pop-ups are like having your mother hover over your shoulder while you work."[36] Computerworld journalist Preston Gralla described the NYT article as "...one of the worst pieces of technical advice ever issued."[37]

See also

[edit]

References

[edit]
  1. ^ "What is User Account Control?". Microsoft. January 2015. Retrieved 2025-08-05.
  2. ^ Windows 7 Feature Focus: User Account Control Archived 2025-08-05 at the Wayback Machine, An overview of UAC in Windows 7 by Paul Thurott
  3. ^ "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application Development Requirements for User Account Control (UAC)". The Windows Vista and Windows Server 2008 Developer Story Series. Microsoft. April 2007. Retrieved 2025-08-05.
  4. ^ Marc Silbey, Peter Brundrett (January 2006). "Understanding and Working in Protected Mode Internet Explorer". Microsoft. Retrieved 2025-08-05.
  5. ^ a b c Torre, Charles (March 5, 2007). "UAC – What. How. Why" (video). Retrieved 2025-08-05.
  6. ^ Howard, Michael; LeBlanc, David (2010). Writing Secure Code for Windows Vista. O'Reilly Media, Inc. ISBN 9780735649316. Retrieved 2025-08-05. UAC started life as the Limited User Account (LUA), then was renamed to User Account Protection (UAP), and finally we got UAC.
  7. ^ a b c Kerr, Kenny (September 29, 2006). "Windows Vista for Developers – Part 4 – User Account Control". Retrieved 2025-08-05.
  8. ^ "Registry Tweaks to Customize User Account Control (UAC) Options in Windows Vista and Later - AskVG". 16 March 2008.
  9. ^ Bott, Ed (2025-08-05). "What triggers User Account Control prompts?". Archived from the original on 2025-08-05.
  10. ^ "Living with and benefiting from User Account Control". Microsoft. 2025-08-05.
  11. ^ Allchin, Jim (2025-08-05). "Security Features vs. Convenience". Windows Vista Team Blog. Microsoft.
  12. ^ "User Account Control Overview". TechNet. Microsoft.
  13. ^ "User Account Control Prompts on the Secure Desktop". UACBlog. Microsoft. 4 May 2006.
  14. ^ a b Bott, Ed (2 February 2007). "Why you need to be discriminating with those Vista tips". Ed Bott's Windows Expertise.
  15. ^ "Determine How to Fix Applications That Are Not Windows 7 Compliant". TechNet. Microsoft. 12 September 2012. Retrieved 2025-08-05.
  16. ^ "Chapter 2: Defend Against Malware". Windows Vista Security Guide. Microsoft. November 8, 2006.
  17. ^ User Account Control: Virtualize file and registry write failures to per-user locations
  18. ^ "Administrator Marking for Command Prompt". UACBlog. Microsoft. 1 August 2006.
  19. ^ "Accessible UAC Prompts". Windows Vista Blog. Microsoft. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  20. ^ a b Russinovich, Mark (June 2007). "Inside Windows Vista User Account Control". TechNet Magazine. Microsoft.
  21. ^ Friedman, Mike (10 February 2006). "Protected Mode in Vista IE7". IEBlog. Microsoft.
  22. ^ Carlisle, Mike (10 March 2007). "Making Your Application UAC Aware". The Code Project.
  23. ^ Zhang, Junfeng (18 October 2006). "Programmatically determine if an application requires elevation in Windows Vista". Junfeng Zhang's Windows Programming Notes. Microsoft.
  24. ^ "Understanding and Configuring User Account Control in Windows Vista". TechNet. Microsoft. Retrieved 2025-08-05.
  25. ^ "Disabling User Account Control (UAC) on Windows Server". Microsoft Support Knowledge Base. Microsoft. Retrieved 2025-08-05.
  26. ^ Russinovich, Mark. "Inside Windows 7 User Account Control". Microsoft. Retrieved 2025-08-05.
  27. ^ Johansson, Jesper. "The Long-Term Impact of User Account Control". Microsoft. Retrieved 2025-08-05.
  28. ^ Russinovich, Mark. "Inside Windows Vista User Account Control". Microsoft. Retrieved 2025-08-05.
  29. ^ Davidson, Leo. "Windows 7 UAC whitelist: – Code-injection Issue – Anti-Competitive API – Security Theatre". Retrieved 2025-08-05.
  30. ^ Kanthak, Stefan. "Defense in depth – the Microsoft way (part 11): privilege escalation for dummies". Full disclosure (mailing list). Retrieved 2025-08-05.
  31. ^ Kanthak, Stefan. "Defense in depth – the Microsoft way (part 31): UAC is for binary planting". Full disclosure (mailing list). Retrieved 2025-08-05.
  32. ^ Trapani, Gina (31 January 2007). "Geek to Live: Windows Vista upgrade power tips". Lifehacker. Archived from the original on 14 September 2011. Retrieved 15 April 2007.
  33. ^ "Disable UAC in Vista". YouTube. Archived from the original on 2025-08-05.
  34. ^ Evers, Joris (2025-08-05). "Report: Vista to hit anti-spyware, firewall markets". ZDNet. CBS Interactive. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  35. ^ Espiner, Tom (11 April 2008). "Microsoft: Vista feature designed to 'annoy users'". CNET. CBS Interactive.
  36. ^ Boutin, Paul (14 May 2009). "How to Wring a Bit More Speed From Vista". New York Times – Gadgetwise. Retrieved 2025-08-05.
  37. ^ Gralla, Preston (2025-08-05). "New York Times blooper: Throw away your anti-virus software". Computerworld. Retrieved 2025-08-05.
[edit]
出汗多吃什么 证监会是干什么的 厚积薄发是什么意思啊 膀胱炎什么症状 侮辱什么意思
心悸是什么原因引起的 甲亢适合吃什么食物 荨麻疹能吃什么食物 怀疑心衰做什么检查 身上长红点是什么原因
电脑一体机什么牌子好 头眩晕看什么科 铁树开花是什么意思 口腔溃疡是什么原因 心魔是什么意思
青少年手抖是什么原因 今年33岁属什么生肖的 硬皮病是什么病 ca是什么意思 载脂蛋白a偏高是什么意思
大头瘟现代叫什么病hcv9jop1ns4r.cn 最近老是犯困想睡觉是什么原因hcv9jop5ns4r.cn 广东有什么市hcv7jop6ns4r.cn 三伏天什么时候最热hcv8jop4ns3r.cn 去医院看脚挂什么科hcv8jop0ns7r.cn
秦二世叫什么名字hcv9jop6ns6r.cn 蚕除了吃桑叶还能吃什么hcv9jop2ns6r.cn 梦见恐龙是什么预兆hcv9jop1ns0r.cn 朱元璋为什么不传位给朱棣kuyehao.com 一什么知什么hcv8jop6ns4r.cn
7号来的月经什么时候是排卵期sscsqa.com 疝外科是治什么病的hcv9jop0ns6r.cn 晚8点是什么时辰hcv9jop3ns1r.cn 龙骨为什么比排骨便宜hcv8jop4ns0r.cn 血脂高是什么原因引起的hcv8jop5ns5r.cn
感冒适合吃什么饭菜hcv7jop5ns2r.cn 每次上大便都出血是什么原因fenrenren.com 狂鸟读什么hcv7jop6ns8r.cn 为什么低血压hcv8jop6ns5r.cn 海底捞是什么hcv8jop1ns1r.cn
百度