Charles said:Uxtheme Rafael said:*snip*
Yes. The problem scenario relies on an infected machine. This infection exploits UAC's default behavior to auto-elevate signed system binaries to achieve silent rights elevation. Of course, if UAC was a security boundary, then it would not possess such behavior.
True or false? There are ways to run arbitrary code on your machine without you agreeing to it.