标签:uac
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft’s Windows Vista and Windows Server 2008 operating systems.
It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation.
In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.
In other words, a user account may have administrator privileges assigned to it,
but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it.
Tasks that require administrator privileges will trigger a UAC prompt (if UAC is enabled);
they are typically marked by a security shield icon
A program can request elevation in a number of different ways.
One way for program developers is to add a requestedPrivileges section to an XML document,
known as the manifest, that is then embedded into the application.
The following message cloud be extra from exe using 7-zip:
xxx.exe\.rsrc\MANIFEST
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="requireAdministrator" uiAccess="false">
</requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
<application xmlns="urn:schemas-microsoft-com:asm.v3">
<windowsSettings>
<ms_windowsSettings:dpiAware xmlns:ms_windowsSettings="http://schemas.microsoft.com/SMI/2005/WindowsSettings" xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</ms_windowsSettings:dpiAware>
</windowsSettings>
</application>
</assembly>
When the ‘requestedExecutionLevel’ option select “highestAvailable” or “requireAdministrator” the Security Shield Icon will appear.
版权声明:本文为博主原创文章,未经博主允许不得转载。
标签:uac
原文地址:http://blog.csdn.net/tms_li/article/details/46919325