Tip & How-To about Microsoft Windows Vista Home Premium Edition for PC

Using UAC in Windows Vista

Windows Vista has the built-in ability to automatically reduce the potential of security breaches in the system. It does that by automatically enabling a feature called User Account Control (or UAC for short). The UAC forces users that are part of the local administrators group to run like they were regular users with no administrative privileges.








Although UAC clearly improves the security on Windows Vista, under some scenarios you might want to disable it, for example when giving demos in front of an audience (demos that are not security related, for example). Some home users might be tempted to disable UAC because of the additional mouse clicking it brings into their system, however I urge them not to immediately do so, and try to get used to it instead.
Anyway, if required, you can disable UAC by using one of the following methods:
Method #1 - Using MSCONFIG

  1. Launch MSCONFIG by from the Run menu.
  2. Click on the Tools tab. Scroll down till you find "Disable UAC" . Click on that line.
  3. Press the Launch button.
  4. A CMD window will open. When the command is done, you can close the window.
  5. Close MSCONFIG. You need to reboot the computer for changes to apply.
You can re-enable UAC by selecting the "Enable UAC" line and then clicking on the Launch button.
*Recommended: Speed up Vista boot times by reducing the number of programs that load at startup. Control your Vista startup list with this Vista app
Method #2 - Using Regedit
  1. Open Registry Editor.
  2. In Registry Editor, navigate to the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
  3. Locate the following value (DWORD): EnableLUA and give it a value of 0.
    Note: As always, before making changes to your registry you should always make sure you have a valid backup. In cases where you're supposed to delete or modify keys or values from the registry it is possible to first export that key or value(s) to a .REG file before performing the changes.
  4. Close Registry Editor. You need to reboot the computer for changes to apply.
In order to re-enable UAC just change the above value to 1.
Method #3 - Using Group Policy This can be done via Local Group Policy or via Active Directory-based GPO, which is much more suited for large networks where one would like to disable UAC for many computers at once.
If using Local Group Policy you'll need to open the Group Policy Editor (Start > Run > gpedit.msc) from your Vista computer.
If using in AD-based GPO, open Group Policy Management Console (Start > Run > gpmc.msc) from a Vista computer that is a member of the domain. In the GPMC window, browse to the required GPO that is linked to the OU or domain where the Vista computers are located, then edit it.
  1. In the Group Policy Editor window, browse to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options.
  2. In the right pane scroll to find the User Access Control policies (they're down at the bottom of the window). You need to configure the following policies:
  3. You'll need to reboot your computers.
Method #4 - Using Control Panel
  1. Open Control Panel.
  2. Under User Account and Family settings click on the "Add or remove user account".
  3. Click on one of the user accounts, for example you can use the Guest account.
  4. Under the user account click on the "Go to the main User Account page" link.
  5. Under "Make changes to your user account" click on the "Change security settings" link.
  6. In the "Turn on User Account Control (UAC) to make your computer more secure" click to unselect the "Use User Account Control (UAC) to help protect your computer". Click on the Ok button.
  7. You will be prompted to reboot your computer. Do so when ready.
In order to re-enable UAC just select the above checkbox and reboot.

Posted by on

Microsoft Windows Vista Home Premium Edition for PC Logo

Related Topics:

Related Questions:

1 Answer

it wont let me on woozworld


Check your firewall and antivirus settings make sure woozworl getting allowed.
If your computer is connected to a network or the Internet, it is advisable to use computer security tools, such as a firewall, to protect your computer from unauthorized access or viruses.
Windows operating systems come with a built-in firewall, malware protection and Internet security.
These settings are automatically configured to the factory's default settings when you purchase the operating system.
To alter the settings for these security features, access the Windows Security utility through your system's Control Panel.

Open the "Windows Security" utility by opening your "Start" menu and selecting the "Control Panel" option on the right-hand side.
Windows XP users can click on the "Security Center" link in this window.
For Vista users, click on the "Security" option, and then click on "Windows Security Center."
Click on the "Windows Firewall" option to change the settings for your firewall, if you are using XP.
You can turn the firewall on or off, and also configure which programs are allowed through the firewall.
Vista users should click on the "Windows Firewall" link in the left window pane and click on the "Change settings" link. In this window, you can block programs from passing through your firewall and grant access to new programs.
Click the "Internet Options" selection to configure your Internet security settings.
You can raise or lower the security level for different zones using preset configurations, or you can create a custom security level.
You can also reset the Internet security level to its default settings.
Click on "Automatic Updating" in the Windows Security Center to configure your system's update settings.
In Vista operating systems, click on "Windows Update" and "Change Settings."
You can configure your update settings to automatically check for updates daily or weekly.
You can also set a convenient time for your system to update to prevent interruption.
Automatic updating can be turned off by selecting the corresponding option toward the bottom of the window.
Select the "Malware Protection" option to edit malware settings if you are using Vista.
This option is not available in XP's version of Windows Security Center.
You can turn the malware protection programs on or off using the arrow to the right of the "Malware Protection" bar.
Click the "X" button to exit Windows Security Settings.

New "Woozworld" Account

Woozworld is an online gaming community aimed at a younger audience, although adults can join as well.
To play games and connect with others on Woozworld, you'll need to create a new account.
You can create an account using the basic Woozworld registration, or you can create one by syncing your Facebook account with Woozworld.

Visit Woozworld.com.
You'll see the account creation box on the right side of the page.
Choose your gender, and choose your age.

Type your email address, and create a password. Type the password again for verification.

Click "Join Now."
Select your Woozen character, and type your desired username.
Click "Play" to create your Woozworld account.
Using Facebook
Visit the Woozworld website, and click "Join Now Using Facebook."
Sign into your Facebook account in the pop-up window.
Click "Allow."
Click "Create Your Woozen."
Choose your Woozen character and a username.
Click "Play."

http://www.woozworld.com/

Sep 11, 2013 | Dell Dimension 2400 PC Desktop

1 Answer

remove security parameters


If your computer is connected to a network or the Internet, it is advisable to use computer security tools, such as a firewall, to protect your computer from unauthorized access or viruses. Windows operating systems come with a built-in firewall, malware protection and Internet security. These settings are automatically configured to the factory's default settings when you purchase the operating system. To alter the settings for these security features, access the Windows Security utility through your system's Control Panel.

Open the "Windows Security" utility by opening your "Start" menu and selecting the "Control Panel" option on the right-hand side. Windows XP users can click on the "Security Center" link in this window. For Vista users, click on the "Security" option, and then click on "Windows Security Center." Click on the "Windows Firewall" option to change the settings for your firewall, if you are using XP. You can turn the firewall on or off, and also configure which programs are allowed through the firewall. Vista users should click on the "Windows Firewall" link in the left window pane and click on the "Change settings" link. In this window, you can block programs from passing through your firewall and grant access to new programs. Click the "Internet Options" selection to configure your Internet security settings. You can raise or lower the security level for different zones using preset configurations, or you can create a custom security level. You can also reset the Internet security level to its default settings. Click on "Automatic Updating" in the Windows Security Center to configure your system's update settings. In Vista operating systems, click on "Windows Update" and "Change Settings." You can configure your update settings to automatically check for updates daily or weekly. You can also set a convenient time for your system to update to prevent interruption. Automatic updating can be turned off by selecting the corresponding option toward the bottom of the window. Select the "Malware Protection" option to edit malware settings if you are using Vista. This option is not available in XP's version of Windows Security Center. You can turn the malware protection programs on or off using the arrow to the right of the "Malware Protection" bar. Click the "X" button to exit Windows Security Settings.

Feb 10, 2013 | HP Computers & Internet

1 Answer

Data Breach SCDOR123


Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>

Dec 31, 2012 | Computers & Internet

2 Answers

My Dell laptop running Vista Home Premium has become very slow. The tech says my "microsoft security layer" has expired and needs to be renewed. As a result there are infected files. Is this possible ? Does one have to renew this security security layer ? I have automatic Windows updates installed and working. I thought the microsoft windows security layer is part of the Windows Vista operating system and is supplied and installed when I purchased the laptop. Please help.


Microsoft security is an antivirus program. Yes, if the antivirus has expired it no longer protects the pc and it has became infected. No, it's not part of Windows, of any one of them. What you had it installed when you purchased was an reduced functionality one that was offered with a rebate and the licence for it has expired after an year.
Since the system is now fully infected you must uninstall the expired antivirus and install a new one. This one is free for home use
http://www.avast.com/free-antivirus-download

Jun 21, 2011 | Dell Computers & Internet

1 Answer

computers problem


Hi,

Appreciate the direct "Ask Me"

Honestly, I can not understand your problem. Nonetheless, I will assume that your concern is that the CD ROM ejects when you click on the drive. If you are using Microsoft Vista, then this is a common issue.

To my knowledge, Vista will only open your CD-RW and DVD RW drive automatically if there is no disc been inserted yet. If you want to disable this feature, there is a trick to disable or turn off Windows Vista auto eject function, by disabling Windows Vista built-in CD/DVD burning feature, which does not affect ability to burn disc using third party program or burning engine such as Nero.This was originally discussed here.

Hope this be of initial help/idea. Pls post back how things turned up or should you need additional information.

Good luck and kind regards. Thank you for using FixYa.

Oct 11, 2008 | Durabrand STS92 System

Not finding what you are looking for?

624 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2658 Answers

Piyal Perera
Piyal Perera

Level 3 Expert

528 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18387 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...