Why do idiot tweak guide authors disable UAC & claim it's not a security function? I'm not going to mention names specifically, but if you do a Google search for "Windows 7 Tweak Guide," you'll likely find what I am talking about. Why do idiots disable UAC, suggest others to do the same, (claim they aren't suggesting it and that they are just giving you [incorrect] information,) and claim it's OK because it isn't a security feature. They then link articles from Microsoft folks and they misquote what was originally said and give the impression that Microsoft wants you to disable UAC and/or UAC will not make your computer any safer. Let's get the facts straight... UAC is and isn't a security feature. It is something that every multi-user operating system should have. It is a secure, controlled method of elevating user privilege tokens. Mac OS X has had something similar called Authenticate (the lock icon) even before Windows Vista came out, so it's nothing new. No conspiracies here; UAC is simply an elevation mechanism. In the way UAC is implemented for a standard user, it is a convenience feature. It allows you to run full-time as a non-administrator to take advantage of the security benefits of using least user access, while elevating specific processes/applications to an administrative level only when you need to make such changes to system settings or install new software onto the machine. If you disable UAC and run as a standard user full time, you are just as secure, but you are going to pull your hair out eventually. The way UAC is implemented for an administrator (Admin Approval Mode) is most certainly a security function. The local administrator is given an admin token and a standard user token. The standard user token is used for executing things unless it specifically requests admin privileges. The secure elevation process helps ensure that the user is specifically intending to allow a program, be it 1st or 3rd party, to borrow admin privileges, as these can be abused by drive-by malware installations. Some people argue this is a "line in the sand" concept, but so is any HIPS-type of measure. If the user is going to be ignorant and assume hitting "yes" to everything is the right thing to do, that's user error, not an issue with UAC. UAC, if used correctly, is a great security measure and is capable of stopping some threats from executing and installing dead in their tracks, thus allowing antivirus software to easily clean them up without having to fight them. Keep in mind, however, that I am mainly arguing for UAC on the "classic Vista" or "Always Notify" setting. So, that's the facts. Now, let's apply the facts to what these "idiots" are recommending... They are recommending turning UAC off because "it is not a security function" and they don't want to be prompted before making administrative changes because they irritates them. So given that explanation, we can infer that they are indeed running as an administrator, because if a prompt bothers them that much, there's no way they are going to be running as a standard user and dealing with having to log out to make any administrative changes. So, these "expert tweakers of Windows" are promoting the idea of turning UAC off, and running full time as an administrator. Now do you realize how stupid what they are purposing is? Golly gee, if it weren't for the improved code mitigations in Windows 7, they might as well be running Windows XP all over again. Recommendation: Stop reading tweak guides blindly. Only you know how you want your computer to run. Just because someone writes a tweak guide and seems to be smart and clever based on how he tells you to partition your hard drive, doesn't mean he knows what's best for you in terms of security. In fact, I find a lot of people know quite a bit about computers in one sense, but know next to nothing about security. This tweak guide I read over-complicates some things, while it tells you to over-simplify your OS back to Windows XP on other things. Tweak guides...one of my pet peeves. Another one of my pet peeves...troubleshooting for 3rd party software vendors that tell you to "disable UAC" as a step in troubleshooting. No vendor should ever advice that. UAC should be enabled fully and left on right when Windows is installed, as it controls registry virtualization. They need to design their software with UAC in mind, and stop telling people to disable it. The phrase I like to employ is: Programs should be designed to run on Windows...Windows shouldn't be tampered with to run poorly written programs. Peace out, sorry for the rant, someone needed to say it.