This HTML5 document contains 18 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n10http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n8http://dbkwik.webdatacommons.org/resource/SsZ4eo1WPllKF1h_icblkg==
n6http://dbkwik.webdatacommons.org/resource/UpM5bpjkC8aso0i2lASsDw==
n16http://dbkwik.webdatacommons.org/resource/NWejT2BOCH-YUhUjNRXCyg==
n2http://dbkwik.webdatacommons.org/resource/XuCJnboDTGCZEgrkSsVutg==
n18http://dbkwik.webdatacommons.org/resource/cBU4oF4_NzuhRcj-G6ycxw==
n13http://dbkwik.webdatacommons.org/resource/IbXgE-m89SrJgEPtwMSH2w==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n5http://dbkwik.webdatacommons.org/malware/property/
n11http://dbkwik.webdatacommons.org/microsoft/property/
n20http://dbkwik.webdatacommons.org/resource/7EMrTGtbNeiE2vyd6KpkGw==
n12http://dbkwik.webdatacommons.org/resource/LbkdQcs5ZnS6QQGQIJ91mA==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n9http://dbkwik.webdatacommons.org/resource/10hxvs-JDu3vJDMu2fwSjg==
xsdhhttp://www.w3.org/2001/XMLSchema#
n14http://dbkwik.webdatacommons.org/computersecurity/property/
dbrhttp://dbpedia.org/resource/
n19http://dbkwik.webdatacommons.org/resource/h5u8BEPyufb8e7UnO9XmFQ==
n15http://dbkwik.webdatacommons.org/resource/jzcEmcdXknZvkgkoU16SKw==
Subject Item
n2:
rdfs:label
User Account Control
rdfs:comment
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase in privilege level. In this way, only applications that the user trusts receive higher privileges, and malware should be kept from receiving the privileges necessary to compromise the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not also have those privileges unless they are approved beforehand or the user explicitly authorizes it to have higher privileges. User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista operating system. It aims to improve the security of Windows by limiting applications to standard user privileges until an administrator authorizes an increase in privilege level. In this way, only applications that the user trusts receive higher privileges, and malware is kept from receiving the privileges necessary to wreak havoc on the operating system. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode".
owl:sameAs
dbr:User_Account_Control
dcterms:subject
n8: n9: n13: n18: n19:
n5:wikiPageUsesTemplate
n6: n20:
n11:wikiPageUsesTemplate
n12:
n14:wikiPageUsesTemplate
n15: n16:
n10:abstract
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista operating system. It aims to improve the security of Windows by limiting applications to standard user privileges until an administrator authorizes an increase in privilege level. In this way, only applications that the user trusts receive higher privileges, and malware is kept from receiving the privileges necessary to wreak havoc on the operating system. In other words, with UAC a user may have administrator privileges, but an application that that user runs does not unless it is approved beforehand or the user explicitly authorizes it to have higher privileges. UAC will usually prompt the user for additional privileges automatically, but the user can also right-click a program and click "Run as administrator". User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase in privilege level. In this way, only applications that the user trusts receive higher privileges, and malware should be kept from receiving the privileges necessary to compromise the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not also have those privileges unless they are approved beforehand or the user explicitly authorizes it to have higher privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode". To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode".