Become REAL Administrator

  • Thread starter Thread starter Guest
  • Start date Start date
D3DAiM

There should not be anything in those folders that a user can modify. If
there are any user configurable files for those program folders, they will
be stored in the Users folder tree. If it is a program that does not
recognize Vista and tries to write to files in C:\Program Files, these files
may be virtualized in the:
C:\Users\username\AppData\Local\VirtualStore\Program Files\whatever program
folder.

Example: Windows Mail.

The programs installation and core files are located at:

C:\Program Files\Windows Mail.

All of the user configurable files are located at:

C:\Users\username\AppData\Local\Microsoft\Windows Mail

This folder contains files such as logs, user configuration settings, and
all of the stored email, newsgroup messages and other files that are created
or written to when the program is running.

The idea is to keep all of the programs core files secure.

Another issue is that UAC is tightly integrated with Virtualization and
compatibility. If UAC is turned off, this could effect some of these
processes.
 
Alright.

You are saying that anything that is actually stored in the C:\Program Files
cannot be modified, and the modifiable files that *appear* as though they are
in the C:\Program Files are actually stored in
C:\Users\username\AppData\Local folder?

So basically Microsoft has designated what files can be modied and what
cannot, effectively removing what thought control I had over my OS.

I am not interested in the security there is involved this, and I am not too
impressed by the quarrel of simulation that is tricking me.

If Microsoft is not willing to help me out on this, I suppose all I can hope
for is a hacked shell replacement and a bunch of registry changes.
 
Kerry Brown said:
Remove Vista and install Windows XP or an older version of Windows. You are
looking for an OS that doesn't enforce security. All the good ones (Vista,
OS/X, Linux, Unix, AIX, Solaris, etc.) do.
 
Back
Top