Menu
Home
Photography Forums
Buy, Sell & Trade
Featured Photos
Media Gallery
Resources
Forums
New posts
Search forums
What's new
New posts
New media
New media comments
New resources
New profile posts
Latest activity
Buy & Sell
Buy, Sell & Trade
Cameraderie Affiliate Vendors!
Support Cameraderie
Affiliate Vendors
Become a subscriber!
Log in
Register
Back
What's new
Search
Search
Search titles only
By:
Latest activity
Account upgrades
Register
Menu
Log in
Register
Install the app
Install
Cameraderie
, a friendly photography forum,
join now for free!
Home
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
account upgrades
Recent contents
View information
Top users
Description
User Account Control (UAC) is a mandatory access control enforcement facility introduced with Microsoft's Windows Vista and Windows Server 2008
operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows 10. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it.
UAC uses Mandatory Integrity Control to isolate running processes with different privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode".
View More On Wikipedia.org
Home
This site uses cookies to help personalize content and to keep you logged in when you join. By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top
Bottom