What's the use of UAC, what is UAC?

Source: Internet
Author: User
Tags administrator password

UAC, user Account Control, is a new technology introduced by Microsoft in Windows Vista to improve system security, requiring users to perform operations that might affect the operation of the computer or to perform changes that affect the settings of other users. Provides a permission or administrator password. By validating these operations before they are started, UAC can help prevent malware and spyware from being installed on your computer or making changes to your computer without permission.

But it's not that not shutting down UAC will definitely cause the software to become unusable, because generally in the process of installation will be prompted to go through the validation, so the program has been installed, but if not shut down UAC may cause some other functions associated with the system does not work, such as the installation of the player, Must be associated with the media file format, make sure to double-click the movie file will automatically use the player to play, but if you open the UAC may be associated with the failure of manual operation.

  Security validation mechanism for UAC

How to turn off UAC:http://www.duote.com/tech/8/21192.html

What is the difference between security levels:

<

Protect Win7 security have to say UAC, as we all know, UAC is the acronym for User Account Control, which is translated as a new technology that is referenced by Microsoft in Windows Vista and Win7, the main feature of which is to perform operations that affect system security , UAC is automatically triggered, and the user is confirmed before executing

Most malware, Trojans, and advertising plug-ins go into the computer like this: Copying files to directories such as Windows or program files, installing drivers, installing ActiveX operations, and all of these triggers UAC. Faced with these unsafe factors, how can users solve the problem caused by UAC? This article describes in detail the detailed features of UAC touches and can be used to prevent the operation of these programs when UAC prompts.

  actions that can trigger UAC include modifying Windows Update configuration, adding or removing user accounts, changing user account types, changing UAC settings, installing ActiveX, installing or uninstalling programs, installing device drivers, and modifying and setting parental controls; Add or modify the registry; Move or copy files to program files or Windows directories; it's annoying to visit other user directories. Yes, Microsoft has been part of UAC since Windows Vista, which has become one of the criticisms of Vista dissatisfaction, Because Vista does not have the same level of UAC as Win7 (in fact, Windows7 UAC is annoying), the general configuration of the computer at the time is very low, so people who are not ready to bounce, but also lock the screen of the guy is disgusted.

UAC is perfect in Win 7 because UAC is annoying, so Microsoft has added the UAC level setting function in Win 7, which corresponds to 4 levels:

  Default level (Level 2):

At the default level, the user is prompted only if the application tries to change the computer settings, and the user actively changes the settings for Windows without prompting. Also, in this mode, the secure desktop is enabled to avoid changing system settings by bypassing UAC. As can be seen, the default level can neither interfere with the normal operation of the user, but also can effectively prevent malicious programs in the user's ignorance to modify the system settings. This level setting can be used by general users.

  Slightly lower than the default level (Level 1):

Slightly different from the default level is that the level will not enable secure desktop, which means it is possible to bypass UAC to change system settings. However, in general, if you use the user to start some programs and need to modify the system, you can run directly, does not create security problems. However, if the user does not run any programs but pop-up prompts window, it may be a malicious program in the attempt to modify system settings, should be determined to choose to block. This level is applicable to users with certain system experience.

  Lowest level (level 0):

The lowest level is to turn off the UAC feature (it must be restarted before it takes effect). At this level, if you are logged on as an administrator, all operations will run directly without any notification, including changes to the system made by viruses or Trojans. At this level, viruses or Trojans can connect to any other computer on the network, or even to the computer on the Internet to communicate or transmit data. Visible if UAC is completely turned off and logged on as an administrator, it can severely degrade system security. In addition, if you are logged in as a standard user, installing, upgrading, or modifying and setting up the system will be directly rejected without prompting any prompts, and the user can only obtain administrator privileges. This level is not recommended because it is visible to completely turn off UAC and log on as a standard user, and the various operations and settings are also inconvenient.

  Highest level (Level 3):

At the advanced level, always notify (that is, fully open), where the user installs the application, upgrades the software, changes the operating system in any case, changes Windows settings, and so on, prompts the user to confirm the alert window (and enable secure desktop). This shows that the level is the safest level, but also the most "troublesome" level, for many people sharing a computer, to restrict other standard users, to prevent them from arbitrarily changing system settings.

But UAC is useful. UAC, although the people who often install the software are annoying, the role of UAC is not negligible. I have to admit that Microsoft is very advanced to the idea of operating system, so it often makes some great but awkward things, just like Vista, when people start to accept Windows 7 today, and then look back to Vista, it is more and more realized that Vista is actually a very good operating system , but is untimely.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.