Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Enterprise Software

Taking a closer look at UAC prompts

By greg shultz September 16, 2009, 4:02 AM PDT

Image
1
of 5

sheilds.png
sheilds.png
Taking a closer look at UAC prompts

Did you know that UACs have color code schemes?

Did you know that UACs have color code schemes?

As you know, Windows Vista has a built-in security feature called User Account Control (UAC for short) that is designed to reduce the potential for security breaches. UAC forces all users, even administrators, to request permission via the UAC prompt in order to perform tasks that require administrative privileges. Standard users must be able to provide an Administrator user name and password and Administrators must simply consent to the operation.

While this is all pretty familiar territory to Vista users, that fact that there are actually four types of UAC prompts each with a different color scheme isn’t. Sure we’ve all encountered UAC prompts, but most of us think of them in generic terms. Seriously, who among us has actually taken the time to look at the color scheme of a UAC? We usually just click a button as fast as we can to move past the prompt. However, like the Homeland Security color levels, each of the successive UAC color coding schemes is designed to convey a greater sense of warning.

In this gallery, I’ll take a closer look at each type of UAC prompt and point out the different color schemes.

Taking a closer look at UAC prompts

Windows need your permission to continue

Windows need your permission to continue

The Windows need your permission to continue is probably the most commonly encountered UAC. This UAC is displayed when a Windows component that exists within the Windows system directory structure and is digitally signed by Microsoft needs administrative privileges to continue. As you can see, the UAC has a multicolored shield on a blue/green background and the component is clearly defined as being a part of the operating system.

Images by Greg Shultz for TechRepublic

Taking a closer look at UAC prompts

A program needs your permission to continue

A program needs your permission to continue

The next most commonly encountered UAC is A program needs your permission to continue. This UAC Is displayed when an executable that is digitally signed by a third-party developer needs administrative privileges to continue. As you can see, this UAC has a yellow shield with an exclamation point on a grey background and the icon, description, and publisher of the program is displayed in the dialog.

Images by Greg Shultz for TechRepublic

Taking a closer look at UAC prompts

An unidentified program wants access to your computer

An unidentified program wants access to your computer

When an executable that that is unsigned is accessed, the An unidentified program wants access to your computer UAC is displayed. As you can see, this UAC has a yellow shield with an exclamation point on a yellow background and the executable is shown using a generic icon along with the publisher being listed as unidentified.

Images by Greg Shultz for TechRepublic

Taking a closer look at UAC prompts

This program has been blocked for your protection

This program has been blocked for your protection

When you attempt to run an executable file that has been specifically blocked by an administrator, you’ll see the This program has been blocked for your protection UAC. In order to convey the seriousness of this warning, the UAC has a red shield with an X on a red background.

Images by Greg Shultz for TechRepublic

  • Enterprise Software
  • Account Information

    Share with Your Friends

    Taking a closer look at UAC prompts

    Your email has been sent

Share: Taking a closer look at UAC prompts
Image of greg shultz
By greg shultz
My first computer was a Kaypro 16 \"luggable\" running MS-DOS 2.11 which I obtained while studying computer science in 1986. After two years, I discovered that I had a knack for writing documentation and shifted my focus over to technical writing.
  • Account Information

    Contact greg shultz

    Your message has been sent

  • |
  • See all of greg's content

TechRepublic Premium

  • TechRepublic Premium

    Best of Confluent Current 2023: The State of Data Streaming

    TechRepublic Premium was at Confluent’s Current 2023 event, held in San Jose, California, September 26-27. Our coverage of the event comprises an analysis of data streaming, interviews, the role of stream governance and a look at Apache Flink. From the download: Confluent used the Current 2023 ‘next generation of Kafka Summit’ event in San Jose ...

    Downloads
    Published:  September 27, 2023, 4:00 PM EDT Modified:  September 28, 2023, 1:00 PM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Fintech

    Fintech is a fast changing landscape that constantly introduces cutting-edge ideas and developments. TechRepublic Premium presents this quick glossary of fintech terms and concepts to help you understand technological breakthroughs and make educated decisions. From the glossary: DECENTRALIZED FINANCE Often referred to as DeFi, this utilizes emerging technology to remove third parties and central financial ...

    Downloads
    Published:  September 27, 2023, 4:00 PM EDT Modified:  September 28, 2023, 8:52 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Anti-Money Laundering Policy

    Money laundering poses a detrimental impact on businesses and the economy as a whole. According to the United Nations Office on Drugs and Crimes, the amount of money laundered around the world in a single year is presumed to be 2–5% of global GDP, which is roughly $800 billion to $2 trillion. The purpose of ...

    Downloads
    Published:  September 27, 2023, 4:00 PM EDT Modified:  September 28, 2023, 9:14 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Video Game Audio Engineer

    Modern video games rely on a cornucopia of sounds to engage and engross players. Whether it is ambient sound to set the mood, music to invoke a feeling or dialog to tell the story, sound is vital to the immersive experience of a video game. The individual responsible for meshing all those disparate sounds together ...

    Published:  September 27, 2023, 4:00 PM EDT Modified:  September 28, 2023, 10:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice