Comment by charcircuit

20 days ago

UAC is not a security boundary. Malware can bypass it if it wants.