UAC Questions

  • Thread starter Thread starter wallaby
  • Start date Start date
W

wallaby

Is there some way of telling UAC "this is a good program" - so that it doeds
not ask every time - the HIPS like apps, with which I am familiar, learn on
the job - ie they have a remember this decision and dont ask again check
box (AnVir, Spybot, Comodo, Online Armor to name a few).
 
wallaby said:
Is there some way of telling UAC "this is a good program" - so that it
doeds not ask every time - the HIPS like apps, with which I am familiar,
learn on the job - ie they have a remember this decision and dont ask
again check box (AnVir, Spybot, Comodo, Online Armor to name a few).

http://www.replaceuac.com/
 
Paul Montgomery said:
On Tue, 5 Aug 2008 00:27:55 -0400, "Mr. Arnold" <MR.


Have you tried it? I don't want to be the first one to download it
and have my pristine, stable system blow up on me!

Might be a good chance to test all my backups though <g>

Back it up and give it a shot. I know one person that hangs in an AV NG
that's now in the Vista Security NG under the post subject Smart UAC that
seems to be using it. You can ask the person. I may give a shot a little
later down the line to see what it's about.

It can be no worst than Application Control solutions in personal FW(s) or
even the original UAC. <smile>
 
Hi Wallaby,



Following installation of an application(program), the application will not
require the user to provide consent or credentials, unless it is an
administrative application. So, simple local applications such as a word
processor or a media player won't usually need administrative permission.
Applications that can affect OS files such as Vista's administrative tools
or 3rd party applications such as Acronis, need administrative permission.





One way of trying to get around this is to turn UAC off. Not recommended.



For more information on UAC go here:



http://technet2.microsoft.com/Windo...8514-4c9e-ac08-4c21f5c6c2d91033.mspx?mfr=true



Go here to see a few reasons why it is not recommended to turn off UAC:



http://en.wikipedia.org/wiki/User_Account_Control
 
On Tue, 5 Aug 2008 00:51:51 -0400, "Mr. Arnold" <MR.
Back it up and give it a shot. I know one person that hangs in an AV NG
that's now in the Vista Security NG under the post subject Smart UAC that
seems to be using it. You can ask the person.

I saw a reference to that program in one of these groups earlier
today... might have been that one.

That thing looks too good to be true. Especially for a FREEBIE.

Something ain't right.
 
Have a read of this article regarding UAC, and how to use it.

cannot set UAC to automatically run a program as an administrator without
the user being prompted.

In Windows Vista, some programs only run correctly if you run them as an
administrator. You may be able to run newer versions of the same programs
without having to run them as an administrator.

Note A security risk may result by using administrative credentials to run
an unknown program. Only run programs that you trust as an administrator.

Important These steps may increase your security risk. These steps may also
make the computer or the network more vulnerable to attack by malicious users
or by malicious software such as viruses. We recommend the process that this
article describes to enable programs to operate as they are designed to or to
implement specific program capabilities. Before you make these changes, we
recommend that you evaluate the risks that are associated with implementing
this process in your particular environment. If you decide to implement this
process, take any appropriate additional steps to help protect the system. We
recommend that you use this process only if you really require this process.

To run a program as an administrator, follow these steps:
1. Right-click the icon that you use to run the program, and then click Run
as administrator.
2. When you are prompted for an administrator password or for a
confirmation, type the administrator password, or click Continue.

For some program icons, the Run as administrator option is not available on
the shortcut menu. For these program icons, follow these steps:
1. Right-click the icon that you use to run the program, and then click
Properties. On the Shortcut tab, the Target box contains the location and the
name of the program file.
2. Open the folder that contains the program file.
3. Right-click the program file, and then click Run as administrator. If
you are prompted for an administrator password or for a confirmation, type
the password, or click Continue.
If you must run a program as an administrator, you may want to set up the
program so that you automatically run it as an administrator. To do this,
follow these steps:
1. Right-click the icon that you use to run the program, and then click
Properties.
2. On the Compatibility tab, click to select the Run this program as an
administrator check box, and then click OK.
The Compatibility tab is not available for some program icons. For these
program icons, follow these steps:
1. Right-click the icon that you use to run the program, and then click
Properties. On the Shortcut tab, the Target box contains the location and the
name of the program file.
2. Open the folder that contains the program file.
3. Right-click the program file, and then click Properties.
 
oscar :) wrote
simple local applications such ... a media player won't usually need
administrative permission

You call a media player simple - they call home, they download pretty
pictures, they seek out digital rights, they install codecs on the fly, they
update themselves, they install themselves in QuickLaunch, they install
toolbars if your not careful, they run bits of themselves at start up, and
they invariably install themselves for access by all users.

Yet a straight forward stand alone cataloging application that I've used for
years is an "unidentified program". Who makes that decision, I can identify
it, I know the author, and her hiusband. I thought it might be to do with a
program being digitally signed, but I have signed programs that are
"unidentified" and unsigned programs that are "identified" and visa versa.
It seems that UAC looks not at what a program is, nor at what it does, but
rather whether it's in some arbitary bureaucratic list or other.

UAC interrupts one's workflow so often that one selects Allow or Continue by
habit, that makes it very easy for a nasty to come in under the radar. This
exposure results directly from UAC's deficiencies - the very thing it is
trying to prevent.

If all you do with your computer is chat, mail, watch voyereurist video
clips, word processing etc then you may not see much of UAC, especially if
you only use MS apps. But if you use your computer as part of a creative
process then you don't want some nanny standing over your shoulder saying
"are you sure you want to use that brush to paint that picture", or "do you
know where that chisel comes from and where it's been".

Why is it that UAC has to be ON, whereas Defender's change notification is,
by default, OFF. So its OK for somethimg to install a run once program
that downloads some malware tomorrow morning - but its not OK for me to run
a an application that I know is a perfectly safe. And, I think UAC allows
programs to run at startup that it would otherwise ask whether it's OK to
run - where's the sense in that.

I dont understand why virtualisation is tied up with UAC (as described in
the referenced Wikipedia article), seems like pathological coupling (ref
http://c2.com/cgi/wiki?CouplingAndCohesion) might alive and well in Seattle,
have we learnt nothing in almost 40 years. If UAC and Virtualisation are so
coupled why would it impact on installs and not the normal operations of a
program.

I found this http://msdn.microsoft.com/en-us/library/bb530198.aspx which is
a summary of Registry Virtualization, does anyone know of something similar
for File Virtualization.

Perhaps what I really need to read is here
http://technet.microsoft.com/en-us/magazine/cc138019.aspx, and then maybe
here
http://www.microsoft.com/downloads/...69-A648-49AF-BC5E-A2EEBB74C16B&displaylang=en.

IMO someone in MS have confused, in presentation at least, management of
user priviledges with whether or not a program comes from a known and
trusted source.

I've never needed to run IE in Protected Mode, what that ever it is, I find
Fx and IETab do all I need.
--
wallaby

ASUS pk5pl, E8200, 4G, 250+320G, 16Mbps ADSL2+
Vista-Business-SP1, Office-Business 2007, AutoUpdate On.

"Write a paper promising salvation, make it a 'structured' something or a
'virtual' something, or 'abstract', 'distributed' or 'higher-order' or
'applicative' and you can almost be certain of having started a new
cult." -- Edsger W. Dijkstra
 
Is there some way of telling UAC "this is a good program" - so that it doeds
not ask every time - the HIPS like apps, with which I am familiar, learn on
the job - ie they have a remember this decision and dont ask again check
box (AnVir, Spybot, Comodo, Online Armor to name a few).

You kidding? Microsoft isn't that smart. UAC is crude, has absolutely
zero intelligence build-in and therefore is next to useless, learning
nothing from past experience.

http://channel9.msdn.com/shows/Going+Deep/UAC-What-How-Why/

Yes, these are the actual two guys responsible for making UAC a joke
and probably the most hated Windows "feature" since BOB. All though
that little dog wagging it's tail was kind of cute. ;-)

You can suffer through the hour plus video and understand the concept
behind UAC and what it is suppose to do, but it is simpler to just
turn the damn thing off. Most people probably do, unless you're one of
the crazy Microsoft worshiping idiots that hang out here.
 
You kidding? Microsoft isn't that smart. UAC is crude, has absolutely
zero intelligence build-in and therefore is next to useless, learning
nothing from past experience.

Another global hack forced on us by MS because they refuse to adopt a
properly designed architecture. It fits well with the global
restriction on files and directories in Vista - another "we'll just
restrict the user from doing anything, then they will be safe".

It reminds me of an old movie line about physical site security
(paraphrased) "if we can just eliminate the people, the security will
be perfect".
 
I think you had better go back and re-read that thread in Security.
It is simply Spyware that YOU are pushing!
 
While I thank you for the link, if you're going to start disabling UAC for
anything, you might as well just turn it off.
 
Gary S. Terhune said:
While I thank you for the link, if you're going to start disabling UAC for
anything, you might as well just turn it off.


No, not is you are just doing it for particular known applications, as
described on the page. I've had to use that method to get an old CAD
application working in Vista.

ss.
 
OK, but just to be clear, your example is not relevant to the OP's desires.
The whole point of UAC isn't to say "OK" to potentially bad programs, it's
to notify you that *something* or *someone* wants to launch the program. The
idea is to get you to ask the question, "What initiated this application?
Was it me? If not, then or who, or what issued the command?" If it isn't
"me" that initiated the program, UAC protocol dictates that I first find out
who or what tried to up the app before I let it continue. And just because
it's OK to run an app one time does not by any means guarantee that the next
time it runs it won't be at the behest of a virus or other malware. Take
Windows Explorer for example. That's one I can see OP adding to the UAC
Ignore List. It's also capable of wiping a lot of data, especially if OP is
already running as Admin. The list is long of legitimate apps that can
destroy your system or your personal data. Or just steal it, whatever.
That's why they put in UAC in the first place (and believe me, I am, shall
we say, ambivalent about the thing.) In the OP's case, using the method you
linked to would be silly. Oughta just turn UAC off.

Now, about that old app of yours. I don't follow. Do you have any idea what
the actual mechanics of the failure to run were? "Run as Administrator"
didn't work?
 
Your entire first paragraph is ridiculous. Makes it pretty obvious where you
fit into the paradigm you describe in your second paragraph -- "Clueless".
 
Back
Top