The thing is, UAC is just plain there in Vista and up; if you could disable it for a given executable then all malware would just disable it.
So your options are: (1) disable UAC entirely, (2) pop up a window whenever you start a process that needs Administrator privileges, (3) open an elevated CMD shell and call things from there (or do the equivalent: any process started by an elevated process will itself be elevated), or (4) write and install a service that always runs as Administrator and can do Administrator things for you.
To do #2, you can use Win32::RunAsAdmin, to do #3 you can use the Elevated Privileges Power Toy or the "elev" utility that Win32::RunAsAdmin installs, and for #4 you're on your own; I've never tried that. Can't be hard, though.
In reply to Re: Perl And Seven UAC click
by Michael Roberts
in thread Perl And Seven UAC click
by didier
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |