No, those user/admin accounts can escalate to user/admin that have full
rights, but that requires UAC to be enabled to escalate to admin with
Full rights. The do not inherit full admin rights from the built-in
hidden Administrator account, like on XP. That link that's being talked
about on vista_administrator.
<
http://news.softpedia.com/news/Admin-Approval-Mode-in-Windows-Vista-4...>
"In this mode (which is on by default for all members of the local
administrators group), every user with administrator privileges runs
normally as a standard user; but when an application or the system needs
to do something that requires administrator permissions, the user is
prompted to approve the task explicitly. Unlike the "super user on"
function from UNIX that leaves the process elevated until the user
explicitly turns it off, admin approval mode enables administrator
privileges for just the task that was approved, automatically returning
the user to standard user when the task is completed," explained Jim
Allchin, Microsoft Co-President, Platform and Services Division.
Well, in this case, you're just *user* joe, and you're not user/admin joe..
I suggest you go back and read the two links up above there about the
example in taking ownership, because joe is part of the Administrators
group. But just plain old *user* joe is not an administrator.
You know, you're really doing yourself a disservice by turning UAC off,
because you are on the Internet wide open to attack, just like you were
on XP, as that O/S gets hammered by malware with a user running with
full admin rights on the Internet.