Hi Donald
This is actually the same way that UAC works, IF you are following the
recommended best practices and logging on with a Standard User account.
Unfortunately, most users are still making the same mistake that they did
with XP and using an administrator account for their everyday logon.
Always, Ronnie...
Anyway, if you are referring to the way one authorizes the
installation of a "kernel-level" application under OS X, I partially
agree. In either case, the OS requires the user's [manual]
intervention before it will proceed with any permission elevation.
However, under OS X, admin permissions are elevated by actually
entering your admin password using the keyboard, while the Vista
method of accomplishing the same thing is by using a click of the
mouse, rather than by the user actually entering his admin
username/password manually "in real-time".
If all the gobbledegook and double-talk is removed from the popular
description of UAC, and the straight truth is told, Vista's UAC uses a
simple "click 'o the mouse" [easily-done programmatically using a
simple Visual Basic script] to validate the user's authenticity.
How is that similar to [or the same as] requiring a real-time manual
entry of a username/pasword?
Personally, I prefer [and trust] third-party Security tools over
Microsoft's [or Apple's]s home-grown brands, although I do believe
that Apple's way is better than Microsoft's if all be told.
BTW, I remain a loyal user of Microsoft products, and own only a
hand-made Intel-based computer, using only off-the-shelf parts
purchased in their brick&mortar store after consulting with actual
human beings face-to-face, then assembled and tested in their own shop
at a local computer company [Pacific Solutions, Inc, in Portland, OR.]
Donald McDaniel