Charles said:brian.shapiro said:*snip*
No, you're not wrong to question behavior. But how did the exploiting code get on your system?
Exactly, which is why I don't really care about UAC that much to begin with. But I see UAC as pretty useless with the exploit.