Charles said:
Uxtheme Rafael said:
*snip*

Yes. The problem scenario relies on an infected machine. This infection exploits UAC's default behavior to auto-elevate signed system binaries to achieve silent rights elevation. Of course, if UAC was a security boundary, then it would not possess such behavior. Smiley

C

True or false? There are ways to run arbitrary code on your machine without you agreeing to it.

http://www.google.com.au/search?hl=en&client=firefox-a&rls=org.mozilla%3Aen-US%3Aofficial&hs=gA0&q=remote+code+execution+site%3Amicrosoft.com%2Ftechnet%2Fsecurity&btnG=Search&meta=