Windows Vista only: You're installing a bunch of software, and Windows Vista's "Need your permission to continue" prompts are driving you mad. You already know how to ...
Dennis O'Reilly began writing about workplace technology as an editor for Ziff-Davis' Computer Select, back when CDs were new-fangled, and IBM's PC XT was wowing the crowds at Comdex. He spent more ...
A few months ago, I wrote about User Account Control (UAC), a controversial new feature slated for inclusion in Windows Vista. Here’s what I had to say last December: The theory behind UAC is sound: ...
Q:Vista is driving me batty. I am the only person who uses my computer, but I get repeated screen messages warning that administrator approval is required for the simplest tasks. Is there any way of ...
I have found most of the "Get a Mac" ads on television irritating and misleading, but two of the most recent ones were spot on: the one where the PC, played by the author and comedian John Hodgman, ...
If you have ever used a personal firewall application such as ZoneAlarm, you are probably familiar with seeing cryptic alert messages pop up on your screen. Essentially, any time a new or unknown ...
The truth is out! Windows Vista’s User Account Control makes you want to put your computer through a wall because that’s what Microsoft wanted. David Cross, a product manager who designed UAC (sadly, ...
Microsoft has countered the rising chorus of whining about its planned User Account Control (UAC) feature in Vista with a new video that shows the new limited accounts in action. Ok, Ok. It's not ...
[Update May 5, 2006 1:35pm PDT: A portion of this post was accidentally deleted on May 4 due to a production error. The text has now been restored and can be seen ...
In this screencast, senior editor Robert Strohmeyer walks through the steps you’ll need to take to tame one of Vista’s most annoying features: user account control (UAC). With a few simple steps, you ...
The best way to keep a system secure is to limit what users can do on a system. The less they can change, the less damage programs run by them can do, assuming there are no security holes, of course.