Charles said:
Uxtheme Rafael said:

Yes. The problem scenario relies on an infected machine. This infection exploits UAC's default behavior to auto-elevate signed system binaries to achieve silent rights elevation. Of course, if UAC was a security boundary, then it would not possess such behavior. Smiley


True or false? There are ways to run arbitrary code on your machine without you agreeing to it.