By default all the software you run has the same rights and privileges you do. For the software you want to run this works well. If you are using an Admin account unprotected by UAC you can do pretty much anything you want, no questions asked. This is convenient for you. That is the way XP and older systems worked.
The problem arises when you accidentally run some malicious software your computer comes into contact with. That malware will be able to do pretty much anything it wants, no questions asked. Great for that malicious software but bad for you.
When XP was released more than 12 years ago security was much less a concern than it is today. By the time Vista was released things had changed for the worse. Security was a serious problem and it was acknowledged it would only get worse. Running with a full time unprotected admin account, while convenient for the user, was just too bug a security risk for the default configuration.
UAC was introduced to address this problem. When logged in with an admin account you really only received the rights and privileges of a standard user account. When you attempted something requiring the full admin rights you had to confirm a dialog box. Or you could temporarily request these rights. Doing things this way was good when malware attempted to run. Inheriting your limited rights it was severely constrained regarding what it could do. Usually it would simply give up in frustration (not literally). Very good for you.
UAC is a compromise between convenience and security. I think it is a good one. It is not ideal but such is the world we live in. Security always has it's price.
Look at this tutorial : Built-in Administrator Account - Enable or Disable in Windows 8
This shows how to enable the hidden administrator account . Running in this mode has security issues , but if you are sure your security setup is tight enough , then you will be fine .
I think you will like the new found freedom .
Hope this helps .
Very true.You may own the computer, but you do not own the Operating System.
You don't own the OS, you have the right to use it. And there are restrictions on what you can and cannot do with it. Much the same situation exists for most commercial software.
Good security has multiple layers of protection. Any one layer can be circumvented and your system put at risk. Malwarebytes and Kaspersky is one layer, but it is not enough. A high priority in the design of malware is that it not be detected. The goal is to avoid detection by the very best AV products with the latest updates. There will always be some malware that escapes detection.
UAC or the use of a limited account forms another layer of protection. Such an account has limited rights and privileges on the computer. That is the reason why these accounts were created. Malware running under such an account will have limited scope for doing damage. Without the protection of UAC your computer is at it's mercy, and it knows none.
Setting UAC to it's lowest level doesn't entirely disable UAC in Windows 8. There is a registry setting that will do so but it is NOT recommended. It will prevent modern (Metro) Apps from working and there are other issues as well.
There are some things other than permissions that can prevent a file from being deleted. A file that is locked for exclusive access cannot be deleted by normal methods no matter what your rights and permissions are.
Thanks for the explanation, I never thought about it that way. I will raise my UAC to a higher level.UAC or the use of a limited account forms another layer of protection. Such an account has limited rights and privileges on the computer. That is the reason why these accounts were created. Malware running under such an account will have limited scope for doing damage. Without the protection of UAC your computer is at it's mercy, and it knows none.
I consider this problem solved, thanks again.