The thing is, UAC is just plain there in Vista and up; if you could disable it for a given executable then all malware would just disable it.
So your options are: (1) disable UAC entirely, (2) pop up a window whenever you start a process that needs Administrator privileges, (3) open an elevated CMD shell and call things from there (or do the equivalent: any process started by an elevated process will itself be elevated), or (4) write and install a service that always runs as Administrator and can do Administrator things for you.
To do #2, you can use Win32::RunAsAdmin, to do #3 you can use the Elevated Privileges Power Toy or the "elev" utility that Win32::RunAsAdmin installs, and for #4 you're on your own; I've never tried that. Can't be hard, though.
|