Charles said:AndyC said:*snip*
UAC is not a security boundary. I'm sorry I used the term "feature". UAC is not a security boundary.
Agreed. UAC is not a security boundary. It is a security feature. The whole Trustworthy Computing/SDL thing is supposed to mean you ship security features in the most secure setting - Secure by Design, Secure by Default, Secure by Deployment+Communication. That appears to have been forgotten.