Coffeehouse Post

Single Post Permalink

View Thread: UAC controversy - the last episode!
  • User profile image

    Suppose one creates an algoritm that diables the ability of the OS to connect to the Internet (well, for maliciously naughty reasons, it can connect to the hacker's devious representation of the Internet, anyway...). If you attempt to download this exploit, then you will be warned. If you try and execute the binary, then UAC will prompt you. Or are you saying you can get around this UAC behavior as part of the very UAC exploit that is the basis of this argument?