Extraordinary new experience under win7 UAC (2)

  
default level:

default level, only if the application will prompt the user when trying to change computer settings, and user take the initiative to make changes to Windows settings are not Will prompt. At the same time, the secure desktop will be enabled in this mode to prevent system settings from being bypassed by UAC. It can be seen that the default level can not interfere with the normal operation of the user, and can effectively prevent the malicious program from modifying the system settings without the user's knowledge. This level setting can be used by normal users.

slightly lower level than the default level:

slightly different from the default level is the level will not enable the secure desktop, which means that there is likely to bypass the UAC circumstances change system settings . However, in general, if you want to start some programs and you need to modify the system, you can run it directly without any security problems. However, if the user does not run any program but pops up a prompt window, it may be that the malicious program is trying to modify the system settings, and you should decisively choose to block. This level is for users with a certain system experience.

lowest level:
lowest level
is turned off UAC function (must take effect after restarting). At this level, if you are logged in as an administrator, all operations will run directly without any notification, including modifications made to the system by viruses or Trojans. At this level, viruses or Trojans can connect to other computers on the network or even communicate with computers on the Internet. It can be seen that if UAC is completely turned off and logged in as an administrator, system security will be seriously degraded. In addition, if you log in as a standard user, installing, upgrading, or modifying and setting up the system will be rejected directly without popping up any prompts. Users can only do so with administrator privileges. It can be seen that UAC is completely turned off and logged in as a standard user. Various operations and settings are also very inconvenient, so it is recommended not to select this level.

but

UAC UAC is useful although often annoying to install the software, but the role of the UAC not be underestimated. I have to admit that Microsoft's concept of operating system is very advanced, so I often come up with some great but embarrassing things, just like Vista, when people started to accept Windows7 today, then go back to see Vista. I am more and more aware that Vista is actually a very good operating system, but it is just a bad time.

Optimization Mistakes

from WindowsXP onwards, optimization is a very hot topic in the system, the Internet can be found to many articles on optimization. However, system optimization must vary from person to person, and blind optimization can only be counterproductive. Many optimized articles come up to teach people how to turn off the various functions that come with Windows. For example, if you turn off UAC, you rarely tell others about the purpose of this function. You can add the speed of the system, but you don't know that it will cause many hidden dangers. It also lost the opportunity to experience new Windows features, and the results are often not worth the candle.

information security bucket theory

a bucket can hold much water, not those determined by the length of the plate, but by the shortest piece of board, this is the famous " The principle of wooden barrels." The same applies to information security. The failure of any one of these links is a total failure. If Edison had smashed his "data" through the file or encrypted it with Bitlocker, we wouldn't have a chance to "satisfy".


Copyright © Windows knowledge All Rights Reserved