"1114020075"^^ . . . . . . . . "\u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0443\u0447\u0451\u0442\u043D\u044B\u0445 \u0437\u0430\u043F\u0438\u0441\u0435\u0439 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439 (\u0430\u043D\u0433\u043B. User Account Control, UAC) \u2014 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u043E\u043F\u0435\u0440\u0430\u0446\u0438\u043E\u043D\u043D\u044B\u0445 \u0441\u0438\u0441\u0442\u0435\u043C Microsoft Windows, \u0432\u043F\u0435\u0440\u0432\u044B\u0435 \u043F\u043E\u044F\u0432\u0438\u0432\u0448\u0438\u0439\u0441\u044F \u0432 Windows Vista. \u042D\u0442\u043E\u0442 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u0437\u0430\u043F\u0440\u0430\u0448\u0438\u0432\u0430\u0435\u0442 \u043F\u043E\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439, \u0442\u0440\u0435\u0431\u0443\u044E\u0449\u0438\u0445 \u043F\u0440\u0430\u0432 \u0430\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u0430, \u0432 \u0446\u0435\u043B\u044F\u0445 \u0437\u0430\u0449\u0438\u0442\u044B \u043E\u0442 \u043D\u0435\u0441\u0430\u043D\u043A\u0446\u0438\u043E\u043D\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u043E\u0433\u043E \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u044F \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430. \u0410\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430 \u043C\u043E\u0436\u0435\u0442 \u043E\u0442\u043A\u043B\u044E\u0447\u0438\u0442\u044C \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0443\u0447\u0451\u0442\u043D\u044B\u0445 \u0437\u0430\u043F\u0438\u0441\u0435\u0439 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439 \u0432 \u041F\u0430\u043D\u0435\u043B\u0438 \u0443\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u0438\u044F."@ru . . . "\u0158\u00EDzen\u00ED u\u017Eivatelsk\u00FDch \u00FA\u010Dt\u016F, anglicky User Account Control, zkr\u00E1cen\u011B UAC, je bezpe\u010Dnostn\u00ED technologie poprv\u00E9 p\u0159edstavena v opera\u010Dn\u00EDm syst\u00E9mu Microsoft Windows Vista. Zvy\u0161uje bezpe\u010Dnost Microsoft Windows omezen\u00EDm opr\u00E1vn\u011Bn\u00ED aplikac\u00EDm na \u00FArove\u0148 u\u017Eivatele dokud administr\u00E1tor nepotvrd\u00ED zv\u00FD\u0161en\u00ED pr\u00E1v aplikace. Pouze aplikace, kter\u00FDm u\u017Eivatel v\u011B\u0159\u00ED, dostanou vy\u0161\u0161\u00ED opr\u00E1vn\u011Bn\u00ED a malwaru je zabr\u00E1n\u011Bno obdr\u017Een\u00ED opr\u00E1vn\u011Bn\u00ED k po\u0161kozen\u00ED syst\u00E9mu. Jin\u00FDmi slovy u\u017Eivatelsk\u00FD \u00FA\u010Det m\u016F\u017Ee m\u00EDt administr\u00E1torsk\u00E1 opr\u00E1vn\u011Bn\u00ED, ale aplikace pou\u0161t\u011Bn\u00E9 u\u017Eivatelem nikoli. Pouze aplikace, u kter\u00FDch bylo p\u0159edem nastavena vy\u0161\u0161\u00ED opr\u00E1vn\u011Bn\u00ED, nebo ty kter\u00E9 u\u017Eivatel do\u010Dasn\u011B povol\u00ED na dotaz syst\u00E9mu. Aby se zamezilo komunikaci aplikace s ni\u017E\u0161\u00EDmi pr\u00E1vy s aplikacemi s vy\u0161\u0161\u00EDmi pr\u00E1vy, je pou\u017Eita jin\u00E1 technologie. je spolu s UAC pou\u017Eito k izolaci proces\u016F od sebe. Jedna z p\u0159edn\u00EDch aplikac\u00ED vyu\u017E\u00EDvaj\u00EDc\u00ED tohoto syst\u00E9mu je Windows Internet Explorer 7 v \u201EProtected Mode\u201C."@cs . . "31563"^^ . . . . . "User Account Control (UAC) (\u0443\u043A\u0440. \u0441\u043B\u0443\u0436\u0431\u0430 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432) \u2014 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u0442\u0430 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0456\u044F \u0431\u0435\u0437\u043F\u0435\u043A\u0438 Microsoft Windows, \u0449\u043E \u0432\u043F\u0435\u0440\u0448\u0435 \u0437'\u044F\u0432\u0438\u0432\u0441\u044F \u0432 Windows Vista \u0442\u0430 Windows Server 2008, \u0431\u0456\u043B\u044C\u0448 \u043F\u043E\u0441\u043B\u0430\u0431\u043B\u0435\u043D\u0430 \u0432\u0435\u0440\u0441\u0456\u044F \u044F\u043A\u043E\u0433\u043E \u043F\u0440\u0438\u0441\u0443\u0442\u043D\u044F \u0432 Windows 7, Windows Server 2008 R2, Windows 8 \u0442\u0430 Windows Server 2012. \u0412\u0456\u043D \u043D\u0430\u043C\u0430\u0433\u0430\u0454\u0442\u044C\u0441\u044F \u043F\u043E\u043A\u0440\u0430\u0449\u0438\u0442\u0438 \u0431\u0435\u0437\u043F\u0435\u043A\u0443 Windows \u043E\u0431\u043C\u0435\u0436\u0443\u044E\u0447\u0438 \u043F\u0440\u0430\u0432\u0430 \u043F\u0440\u043E\u0433\u0440\u0430\u043C \u0434\u043E \u043F\u0440\u0430\u0432 \u0441\u0442\u0430\u043D\u0434\u0430\u0440\u0442\u043D\u043E\u0433\u043E \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430 \u0456 \u043D\u0430\u0434\u0430\u044E\u0447\u0438 \u0457\u043C \u0437\u0431\u0456\u043B\u044C\u0448\u0435\u043D\u0456 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u0457 \u0442\u0456\u043B\u044C\u043A\u0438 \u043F\u0456\u0441\u043B\u044F \u0434\u043E\u0437\u0432\u043E\u043B\u0443 \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u0430. \u0422\u0430\u043A\u0438\u043C \u0447\u0438\u043D\u043E\u043C \u043B\u0438\u0448\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0438 \u044F\u043A\u0438\u043C \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u0434\u043E\u0432\u0456\u0440\u044F\u0454 \u043E\u0442\u0440\u0438\u043C\u0443\u044E\u0442\u044C \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043D\u0456 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u0457, \u0430 \u0448\u043A\u0456\u0434\u043B\u0438\u0432\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u0435 \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0456\u0437\u043E\u043B\u044E\u0454\u0442\u044C\u0441\u044F \u0432\u0456\u0434 \u0441\u0438\u0441\u0442\u0435\u043C\u0438. \u0406\u043D\u0448\u0438\u043C\u0438 \u0441\u043B\u043E\u0432\u0430\u043C\u0438, \u043D\u0430\u0432\u0456\u0442\u044C \u044F\u043A\u0449\u043E \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u0454 \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u043E\u043C, \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0438 \u044F\u043A\u0456 \u0432\u0456\u043D \u0437\u0430\u043F\u0443\u0441\u043A\u0430\u0454 \u0437\u0430\u043F\u0443\u0441\u043A\u0430\u044E\u0442\u044C\u0441\u044F \u0437\u0456 \u0437\u0432\u0438\u0447\u0430\u0439\u043D\u0438\u043C\u0438 \u043F\u0440\u0430\u0432\u0430\u043C\u0438, \u044F\u043A\u0449\u043E \u0442\u0456\u043B\u044C\u043A\u0438 \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u044F\u0432\u043D\u043E \u043D\u0435 \u043D\u0430\u0434\u0430\u0441\u0442\u044C \u0457\u043C \u0442\u0430\u043A\u0456 \u043F\u0440\u0430\u0432\u0430. \u0410\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u0430 \u043C\u043E\u0436\u0435 "@uk . . "\u30E6\u30FC\u30B6\u30FC\u30A2\u30AB\u30A6\u30F3\u30C8\u5236\u5FA1"@ja . . "Kontrola konta u\u017Cytkownika"@pl . . . . . . "Gebruikersaccountbeheer"@nl . . . . . . . . . . . "User Account Control (UAC) (\u0443\u043A\u0440. \u0441\u043B\u0443\u0436\u0431\u0430 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432) \u2014 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u0442\u0430 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0456\u044F \u0431\u0435\u0437\u043F\u0435\u043A\u0438 Microsoft Windows, \u0449\u043E \u0432\u043F\u0435\u0440\u0448\u0435 \u0437'\u044F\u0432\u0438\u0432\u0441\u044F \u0432 Windows Vista \u0442\u0430 Windows Server 2008, \u0431\u0456\u043B\u044C\u0448 \u043F\u043E\u0441\u043B\u0430\u0431\u043B\u0435\u043D\u0430 \u0432\u0435\u0440\u0441\u0456\u044F \u044F\u043A\u043E\u0433\u043E \u043F\u0440\u0438\u0441\u0443\u0442\u043D\u044F \u0432 Windows 7, Windows Server 2008 R2, Windows 8 \u0442\u0430 Windows Server 2012. \u0412\u0456\u043D \u043D\u0430\u043C\u0430\u0433\u0430\u0454\u0442\u044C\u0441\u044F \u043F\u043E\u043A\u0440\u0430\u0449\u0438\u0442\u0438 \u0431\u0435\u0437\u043F\u0435\u043A\u0443 Windows \u043E\u0431\u043C\u0435\u0436\u0443\u044E\u0447\u0438 \u043F\u0440\u0430\u0432\u0430 \u043F\u0440\u043E\u0433\u0440\u0430\u043C \u0434\u043E \u043F\u0440\u0430\u0432 \u0441\u0442\u0430\u043D\u0434\u0430\u0440\u0442\u043D\u043E\u0433\u043E \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430 \u0456 \u043D\u0430\u0434\u0430\u044E\u0447\u0438 \u0457\u043C \u0437\u0431\u0456\u043B\u044C\u0448\u0435\u043D\u0456 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u0457 \u0442\u0456\u043B\u044C\u043A\u0438 \u043F\u0456\u0441\u043B\u044F \u0434\u043E\u0437\u0432\u043E\u043B\u0443 \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u0430. \u0422\u0430\u043A\u0438\u043C \u0447\u0438\u043D\u043E\u043C \u043B\u0438\u0448\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0438 \u044F\u043A\u0438\u043C \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u0434\u043E\u0432\u0456\u0440\u044F\u0454 \u043E\u0442\u0440\u0438\u043C\u0443\u044E\u0442\u044C \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043D\u0456 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u0457, \u0430 \u0448\u043A\u0456\u0434\u043B\u0438\u0432\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u0435 \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0456\u0437\u043E\u043B\u044E\u0454\u0442\u044C\u0441\u044F \u0432\u0456\u0434 \u0441\u0438\u0441\u0442\u0435\u043C\u0438. \u0406\u043D\u0448\u0438\u043C\u0438 \u0441\u043B\u043E\u0432\u0430\u043C\u0438, \u043D\u0430\u0432\u0456\u0442\u044C \u044F\u043A\u0449\u043E \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u0454 \u0430\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u043E\u043C, \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0438 \u044F\u043A\u0456 \u0432\u0456\u043D \u0437\u0430\u043F\u0443\u0441\u043A\u0430\u0454 \u0437\u0430\u043F\u0443\u0441\u043A\u0430\u044E\u0442\u044C\u0441\u044F \u0437\u0456 \u0437\u0432\u0438\u0447\u0430\u0439\u043D\u0438\u043C\u0438 \u043F\u0440\u0430\u0432\u0430\u043C\u0438, \u044F\u043A\u0449\u043E \u0442\u0456\u043B\u044C\u043A\u0438 \u043A\u043E\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447 \u044F\u0432\u043D\u043E \u043D\u0435 \u043D\u0430\u0434\u0430\u0441\u0442\u044C \u0457\u043C \u0442\u0430\u043A\u0456 \u043F\u0440\u0430\u0432\u0430. \u0410\u0434\u043C\u0456\u043D\u0456\u0441\u0442\u0440\u0430\u0442\u043E\u0440 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u0430 \u043C\u043E\u0436\u0435 \u0432\u0456\u0434\u043A\u043B\u044E\u0447\u0438\u0442\u0438 UAC \u0443 \u043F\u0430\u043D\u0435\u043B\u0456 \u043A\u0435\u0440\u0443\u0432\u0430\u043D\u043D\u044F. \u0429\u043E\u0431 \u0437\u043C\u0435\u043D\u0448\u0438\u0442\u0438 \u043C\u043E\u0436\u043B\u0438\u0432\u0456\u0441\u0442\u044C \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0430\u043C \u0437 \u043D\u0438\u0436\u0447\u0438\u043C\u0438 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u044F\u043C\u0438 \u043A\u043E\u043C\u0443\u043D\u0456\u043A\u0443\u0432\u0430\u0442\u0438 \u0437 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u0430\u043C\u0438 \u0437 \u0432\u0438\u0449\u0438\u043C\u0438 \u043F\u0440\u0438\u0432\u0456\u043B\u0435\u044F\u043C\u0438, \u0432 \u043F\u043E\u0454\u0434\u043D\u0430\u043D\u043D\u0456 \u0437 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0456\u0454\u044E UAC \u0432\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u043E\u0432\u0443\u0454\u0442\u044C\u0441\u044F \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0456\u044F . \u041E\u0434\u043D\u0438\u043C \u0437 \u043D\u0430\u0439\u0432\u0456\u0434\u043E\u043C\u0456\u0448\u0438\u0445 \u0432\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u0430\u043D\u044C \u0446\u0456\u0454\u0457 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0456\u0457 \u0454 \u0437\u0430\u0445\u0438\u0449\u0435\u043D\u0438\u0439 \u0440\u0435\u0436\u0438\u043C \u0432 Internet Explorer 7."@uk . "\uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864(User Account Control, UAC)\uC740 \uB9C8\uC774\uD06C\uB85C\uC18C\uD504\uD2B8\uC758 \uC708\uB3C4\uC6B0 \uBE44\uC2A4\uD0C0 \uC6B4\uC601 \uCCB4\uC81C\uC5D0\uC11C \uCC98\uC74C \uC120\uBCF4\uC778 \uBCF4\uC548 \uAE30\uC220\uC774\uB2E4. \uC708\uB3C4\uC6B0 \uC11C\uBC84 2008\uACFC \uC708\uB3C4\uC6B0 7\uC5D0\uB3C4 \uB3C4\uC785\uB418\uC5C8\uB2E4. \uAD00\uB9AC\uC790\uAC00 \uAD8C\uD55C \uC218\uC900\uC744 \uB192\uC774\uB294 \uAC83\uC744 \uD5C8\uC6A9\uD560 \uB54C\uAE4C\uC9C0 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uB4E4\uC740 \uD45C\uC900 \uC0AC\uC6A9\uC790 \uAD8C\uD55C\uC73C\uB85C \uC81C\uD55C\uC744 \uB460\uC5D0 \uB530\uB77C \uC6B4\uC601 \uCCB4\uC81C\uC758 \uBCF4\uC548\uC744 \uAC1C\uC120\uD558\uB294 \uB370 \uC911\uC810\uC744 \uB450\uC5C8\uB2E4. \uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864\uC744 \uAC00\uC9C0\uACE0 \uC0AC\uC6A9\uC790\uB294 \uAD00\uB9AC\uC790 \uAD8C\uD55C\uC744 \uC5BB\uC744 \uC218 \uC788\uC9C0\uB9CC \uC0AC\uC6A9\uC790\uAC00 \uC2E4\uD589\uD558\uB294 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uC740 \uC0AC\uC6A9\uC790\uAC00 \uB354 \uB192\uC740 \uC218\uC900\uC758 \uAD8C\uD55C\uC744 \uBBF8\uB9AC \uC2B9\uC778\uD558\uC9C0 \uC54A\uB294 \uD55C \uADF8\uB7EC\uD55C \uAD8C\uD55C\uC744 \uC5BB\uC744 \uC218 \uC5C6\uB2E4. \uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864\uC740 \uC0AC\uC6A9\uC790 \uC778\uD130\uD398\uC774\uC2A4 \uAD8C\uD55C \uBD84\uB9AC\uB97C \uC0AC\uC6A9\uD558\uC5EC \uAD00\uB9AC\uC790\uC640 \uBE44\uAD00\uB9AC\uC790\uC758 \uC791\uC5C5\uC744 \uB530\uB85C \uB5BC\uC5B4 \uB193\uB294\uB2E4. \uD55C \uC608\uB85C \uC778\uD130\uB137 \uC775\uC2A4\uD50C\uB85C\uB7EC 7\uC5D0\uC11C \uC120\uBCF4\uC778 \"\uBCF4\uD638 \uBAA8\uB4DC\"\uB97C \uB4E4 \uC218 \uC788\uB2E4. UAC\uB294 \uC0AC\uC6A9\uC790\uC5D0\uAC8C \uCD94\uAC00\uC801\uC778 \uAD8C\uD55C\uC744 \uC790\uB3D9\uC73C\uB85C \uD655\uC778\uD560 \uC218\uB3C4 \uC788\uC9C0\uB9CC, \uC0AC\uC6A9\uC790\uAC00 \uC9C1\uC811 \uD504\uB85C\uADF8\uB7A8 \uC544\uC774\uCF58\uC5D0\uC11C \uB9C8\uC6B0\uC2A4 \uC624\uB978\uCABD \uB2E8\uCD94\uB97C \uB204\uB974\uACE0 \"\uAD00\uB9AC\uC790 \uAD8C\uD55C\uC73C\uB85C \uC2E4\uD589\"\uC744 \uB20C\uB7EC\uB3C4 \uD6A8\uACFC\uB294 \uAC19\uB2E4."@ko . "User Account Control"@uk . "Gebruikersaccountbeheer of UAC (Engels: User Account Control) is een beveiligingstechniek die wordt toegepast op computers die Windows Vista, Windows 7, Windows 8, Windows 10 of Windows 11 draaien. Als er een programma wordt geopend dat wijzigingen wil toebrengen buiten het eigen gebruikersgebied of gegevens van andere gebruikers wil lezen, zal UAC een waarschuwing geven. Het systeem is hierdoor beter beveiligd."@nl . "User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorises an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges and malware are kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those "@en . . "Die Benutzerkontensteuerung (englisch User Account Control, kurz UAC) ist ein Sicherheitsmechanismus von Microsoft Windows, welcher mit Windows Vista eingef\u00FChrt wurde. Die Benutzerkontensteuerung wurde eingef\u00FChrt, weil viele Windows-Anwender mit Administratorprivilegien arbeiten, welche bis Windows XP direkt auf gestartete Anwendungen \u00FCbertragen wurden. Dieses Verhalten stellte ein gro\u00DFes Sicherheitsrisiko dar, weil so auch Schadsoftware administrative Rechte erhielt. Mit aktiver Benutzerkontensteuerung erhalten Anwendungen zun\u00E4chst nur die Rechte eines normalen Nutzers, selbst wenn der Nutzer Administratorprivilegien hat. Anwendungen k\u00F6nnen bei Bedarf administrative Rechte vom Administrator anfordern. Der Administrator muss die Rechteerh\u00F6hung ausdr\u00FCcklich gew\u00E4hren. Der Mechanismus ist bedingt mit dem unter UNIX-Systemen bekannten sudo Befehl vergleichbar. Das Verhalten der Benutzerkontensteuerung ist anpassbar. Beispielsweise kann eingestellt werden, dass anstelle eines einfachen Best\u00E4tigungsdialoges das Anmeldepasswort zur Rechteerh\u00F6hung eingegeben werden muss. Technisch bildet die Benutzerkontensteuerung die Grundlage f\u00FCr das Sandboxing von Programmen und Verzeichnissen unter Windows. Sie erm\u00F6glicht die Vergabe von Privilegien an Prozesse und die Isolierung von Prozessen und Fenstern, die auf demselben System mit unterschiedlichen Rechten ausgef\u00FChrt werden."@de . . "\u4F7F\u7528\u8005\u5E33\u6236\u63A7\u5236"@zh . "\uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864(User Account Control, UAC)\uC740 \uB9C8\uC774\uD06C\uB85C\uC18C\uD504\uD2B8\uC758 \uC708\uB3C4\uC6B0 \uBE44\uC2A4\uD0C0 \uC6B4\uC601 \uCCB4\uC81C\uC5D0\uC11C \uCC98\uC74C \uC120\uBCF4\uC778 \uBCF4\uC548 \uAE30\uC220\uC774\uB2E4. \uC708\uB3C4\uC6B0 \uC11C\uBC84 2008\uACFC \uC708\uB3C4\uC6B0 7\uC5D0\uB3C4 \uB3C4\uC785\uB418\uC5C8\uB2E4. \uAD00\uB9AC\uC790\uAC00 \uAD8C\uD55C \uC218\uC900\uC744 \uB192\uC774\uB294 \uAC83\uC744 \uD5C8\uC6A9\uD560 \uB54C\uAE4C\uC9C0 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uB4E4\uC740 \uD45C\uC900 \uC0AC\uC6A9\uC790 \uAD8C\uD55C\uC73C\uB85C \uC81C\uD55C\uC744 \uB460\uC5D0 \uB530\uB77C \uC6B4\uC601 \uCCB4\uC81C\uC758 \uBCF4\uC548\uC744 \uAC1C\uC120\uD558\uB294 \uB370 \uC911\uC810\uC744 \uB450\uC5C8\uB2E4. \uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864\uC744 \uAC00\uC9C0\uACE0 \uC0AC\uC6A9\uC790\uB294 \uAD00\uB9AC\uC790 \uAD8C\uD55C\uC744 \uC5BB\uC744 \uC218 \uC788\uC9C0\uB9CC \uC0AC\uC6A9\uC790\uAC00 \uC2E4\uD589\uD558\uB294 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uC740 \uC0AC\uC6A9\uC790\uAC00 \uB354 \uB192\uC740 \uC218\uC900\uC758 \uAD8C\uD55C\uC744 \uBBF8\uB9AC \uC2B9\uC778\uD558\uC9C0 \uC54A\uB294 \uD55C \uADF8\uB7EC\uD55C \uAD8C\uD55C\uC744 \uC5BB\uC744 \uC218 \uC5C6\uB2E4. \uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864\uC740 \uC0AC\uC6A9\uC790 \uC778\uD130\uD398\uC774\uC2A4 \uAD8C\uD55C \uBD84\uB9AC\uB97C \uC0AC\uC6A9\uD558\uC5EC \uAD00\uB9AC\uC790\uC640 \uBE44\uAD00\uB9AC\uC790\uC758 \uC791\uC5C5\uC744 \uB530\uB85C \uB5BC\uC5B4 \uB193\uB294\uB2E4. \uD55C \uC608\uB85C \uC778\uD130\uB137 \uC775\uC2A4\uD50C\uB85C\uB7EC 7\uC5D0\uC11C \uC120\uBCF4\uC778 \"\uBCF4\uD638 \uBAA8\uB4DC\"\uB97C \uB4E4 \uC218 \uC788\uB2E4. UAC\uB294 \uC0AC\uC6A9\uC790\uC5D0\uAC8C \uCD94\uAC00\uC801\uC778 \uAD8C\uD55C\uC744 \uC790\uB3D9\uC73C\uB85C \uD655\uC778\uD560 \uC218\uB3C4 \uC788\uC9C0\uB9CC, \uC0AC\uC6A9\uC790\uAC00 \uC9C1\uC811 \uD504\uB85C\uADF8\uB7A8 \uC544\uC774\uCF58\uC5D0\uC11C \uB9C8\uC6B0\uC2A4 \uC624\uB978\uCABD \uB2E8\uCD94\uB97C \uB204\uB974\uACE0 \"\uAD00\uB9AC\uC790 \uAD8C\uD55C\uC73C\uB85C \uC2E4\uD589\"\uC744 \uB20C\uB7EC\uB3C4 \uD6A8\uACFC\uB294 \uAC19\uB2E4."@ko . . . . . . . . . "Die Benutzerkontensteuerung (englisch User Account Control, kurz UAC) ist ein Sicherheitsmechanismus von Microsoft Windows, welcher mit Windows Vista eingef\u00FChrt wurde. Die Benutzerkontensteuerung wurde eingef\u00FChrt, weil viele Windows-Anwender mit Administratorprivilegien arbeiten, welche bis Windows XP direkt auf gestartete Anwendungen \u00FCbertragen wurden. Dieses Verhalten stellte ein gro\u00DFes Sicherheitsrisiko dar, weil so auch Schadsoftware administrative Rechte erhielt. Mit aktiver Benutzerkontensteuerung erhalten Anwendungen zun\u00E4chst nur die Rechte eines normalen Nutzers, selbst wenn der Nutzer Administratorprivilegien hat."@de . . . "\u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0443\u0447\u0451\u0442\u043D\u044B\u0445 \u0437\u0430\u043F\u0438\u0441\u0435\u0439 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439"@ru . "El Control de Cuentas de Usuario (UAC por sus siglas en ingl\u00E9s) es una tecnolog\u00EDa e infraestructura de seguridad que Microsoft introdujo con Windows Vista ahora presente en Windows 7-8-10; Server 2008 y Server 2012. Su objetivo es mejorar la seguridad de Windows al impedir que aplicaciones maliciosas hagan cambios no autorizados en el ordenador. Debido en parte a las frecuentes alertas que conlleva usar este sistema, se puede desactivar en Windows 7 y Windows Vista. Trata de mejorar la seguridad de Microsoft Windows limitando el software de aplicaciones a los privilegios de usuario est\u00E1ndar, hasta que un administrador autoriza un incremento o elevaci\u00F3n. \n* A continuaci\u00F3n, se enumeran algunos motivos por los que hoy en d\u00EDa las empresas funcionan con usuarios administradores con Windows Vista: \n* Instalaci\u00F3n de aplicaciones (los miembros del grupo Usuarios no pueden instalar o desinstalar aplicaciones): Muchas empresas no disponen de un m\u00E9todo centralizado de implementaci\u00F3n de aplicaciones para los usuarios, como por ejemplo, Microsoft Systems Management Server (SMS), la Directiva de grupo de Instalaci\u00F3n de software (GPSI) u otra tecnolog\u00EDa de implementaci\u00F3n de aplicaciones similar. Las empresas que s\u00ED usan tecnolog\u00EDas de implementaci\u00F3n de software permiten que los usuarios se ejecuten como administradores debido a instalaciones de aplicaciones ad hoc espec\u00EDficas para departamentos espec\u00EDficos (por ejemplo, una aplicaci\u00F3n de hojas de c\u00E1lculo personalizada para el departamento de marketing). \n* Aplicaciones web personalizadas (controles ActiveX): Con el crecimiento de la comunidad de fabricantes independientes de software (ISV), muchas empresas optan por aplicaciones personalizadas dise\u00F1adas para sus requisitos de negocio espec\u00EDficos. Muchas de estas aplicaciones personalizadas incorporan un front-end de explorador web que requiere un control ActiveX para poder instalarse. Dado que los son archivos ejecutables y pueden contener malware, Windows impide que los miembros del grupo usuarios puedan instalarlos. \n* TCO inferior percibido (menos llamadas a soporte t\u00E9cnico frente a menor superficie de ataques): Muchas empresas creen que al permitir que los usuarios se instalen sus propias aplicaciones disminuir\u00E1 el n\u00FAmero y el costo de llamadas al departamento de soporte t\u00E9cnico. Sin embargo, operar en las estaciones de trabajo como administrador tambi\u00E9n hace que la red sea m\u00E1s vulnerable a \"malware\" (el t\u00E9rmino que engloba todo el software malintencionado, incluyendo virus, caballos de Troya, spyware y cierto adware. El malware puede explotar el acceso de nivel de sistema de una cuenta de administrador local para da\u00F1ar archivos, cambiar configuraciones del sistema e incluso transmitir datos confidenciales fuera de la red. Enlaces externos UAC (User Account Control) \u2014 Informaci\u00F3n en Microsoft TechNet"@es . "\u4F7F\u7528\u8005\u5E33\u6236\u63A7\u5236\uFF08\u82F1\u8A9E\uFF1AUser Account Control\uFF0CUAC\uFF09\u4E3AWindows Vista\u4E2D\u6240\u63A8\u51FA\u7684\u5B89\u5168\u6280\u8853\u4E4B\u4E00\uFF0C\u5176\u4E3B\u8981\u7279\u70B9\u5728\u4E8E\u901A\u904E\u9650\u5236\u61C9\u7528\u8EDF\u4EF6\u5BF9\u7CFB\u7EDF\u5C42\u7EA7\u7684\u8BBF\u95EE\uFF0C\u4ECE\u800C\u6539\u9032Windows\u4F5C\u696D\u7CFB\u7D71\u7684\u5B89\u5168\u6027\u3002\u96D6\u7136\u6B64\u985E\u6A5F\u80FD\u4E00\u76F4\u906D\u5230\u90E8\u5206\u7528\u6236\u7684\u6279\u8A55\uFF0C\u4F46\u540E\u7EED\u7684Windows\u4F5C\u696D\u7CFB\u7D71\u4ECD\u4FDD\u7559\u6B64\u985E\u6A5F\u80FD\u3002\u5728\u5F8C\u7E8C\u7684Windows 7\u4E2D\uFF0C\u5FAE\u8EDF\u516C\u53F8\u4FDD\u7559\u4E26\u6539\u9032\u4E86\u6B64\u9805\u6A5F\u80FD\uFF08\u5982\uFF1A\u81EA\u5B9A\u7FA9UAC\u7684\u5B89\u5168\u7B49\u7EA7\uFF09\u3002"@zh . . "\u0158\u00EDzen\u00ED u\u017Eivatelsk\u00FDch \u00FA\u010Dt\u016F"@cs . . . . "\u4F7F\u7528\u8005\u5E33\u6236\u63A7\u5236\uFF08\u82F1\u8A9E\uFF1AUser Account Control\uFF0CUAC\uFF09\u4E3AWindows Vista\u4E2D\u6240\u63A8\u51FA\u7684\u5B89\u5168\u6280\u8853\u4E4B\u4E00\uFF0C\u5176\u4E3B\u8981\u7279\u70B9\u5728\u4E8E\u901A\u904E\u9650\u5236\u61C9\u7528\u8EDF\u4EF6\u5BF9\u7CFB\u7EDF\u5C42\u7EA7\u7684\u8BBF\u95EE\uFF0C\u4ECE\u800C\u6539\u9032Windows\u4F5C\u696D\u7CFB\u7D71\u7684\u5B89\u5168\u6027\u3002\u96D6\u7136\u6B64\u985E\u6A5F\u80FD\u4E00\u76F4\u906D\u5230\u90E8\u5206\u7528\u6236\u7684\u6279\u8A55\uFF0C\u4F46\u540E\u7EED\u7684Windows\u4F5C\u696D\u7CFB\u7D71\u4ECD\u4FDD\u7559\u6B64\u985E\u6A5F\u80FD\u3002\u5728\u5F8C\u7E8C\u7684Windows 7\u4E2D\uFF0C\u5FAE\u8EDF\u516C\u53F8\u4FDD\u7559\u4E26\u6539\u9032\u4E86\u6B64\u9805\u6A5F\u80FD\uFF08\u5982\uFF1A\u81EA\u5B9A\u7FA9UAC\u7684\u5B89\u5168\u7B49\u7EA7\uFF09\u3002"@zh . . . . . . . . . . "El Control de Cuentas de Usuario (UAC por sus siglas en ingl\u00E9s) es una tecnolog\u00EDa e infraestructura de seguridad que Microsoft introdujo con Windows Vista ahora presente en Windows 7-8-10; Server 2008 y Server 2012. Su objetivo es mejorar la seguridad de Windows al impedir que aplicaciones maliciosas hagan cambios no autorizados en el ordenador. Debido en parte a las frecuentes alertas que conlleva usar este sistema, se puede desactivar en Windows 7 y Windows Vista. UAC (User Account Control) \u2014 Informaci\u00F3n en Microsoft TechNet"@es . . . . . . . . . . "User Account Control (UAC, \u00AB contr\u00F4le du compte de l'utilisateur \u00BB) est un m\u00E9canisme de protection des donn\u00E9es introduit dans les syst\u00E8mes d'exploitation Windows Vista et 7. UAC est aussi connu sous ses d\u00E9nominations pr\u00E9c\u00E9dentes durant le d\u00E9veloppement de Windows Vista, \u00E0 savoir UAP (User Account Protection) et LUP (Least User Privilege)."@fr . . . . . "Lo User Account Control (UAC - Controllo Account Utente) \u00E8 un modulo software di protezione introdotto da Microsoft a partire da Windows Vista, che gestisce i permessi dei singoli utenti del computer in modo da impedire ai non autorizzati l'esecuzione di software dannoso o il danneggiamento di dati o di componenti del sistema. Uno dei principali difetti delle precedenti versioni dei sistemi Windows era, infatti, legato alla sicurezza e al problema della esecuzione di molti processi e applicazioni in modalit\u00E0 \"amministratore di sistema\"."@it . . . "Kontrola konta u\u017Cytkownika (ang. User Account Control, UAC) \u2013 komponent ochronny wprowadzony w systemie operacyjnym Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 i Windows 11. W za\u0142o\u017Ceniu mia\u0142 poprawia\u0107 bezpiecze\u0144stwo system\u00F3w Windows poprzez ograniczanie dost\u0119pu aplikacji do dzia\u0142ania tak d\u0142ugo, a\u017C administrator systemu nie autoryzuje dla nich dost\u0119pu i w efekcie zapobiega\u0107 wykonaniu kodu bez zezwolenia u\u017Cytkownika. Pod tym wzgl\u0119dem rozwi\u0105zanie to jest bardzo podobne do tego zastosowanego w systemach uniksopodobnych (poprzez sudo). Dzia\u0142anie komponentu w Windows Vista spotka\u0142o si\u0119 z mocn\u0105 krytyk\u0105."@pl . . . . . . . . . . . . . . . . . . . . . "User Account Control"@fr . . . "Gebruikersaccountbeheer of UAC (Engels: User Account Control) is een beveiligingstechniek die wordt toegepast op computers die Windows Vista, Windows 7, Windows 8, Windows 10 of Windows 11 draaien. Als er een programma wordt geopend dat wijzigingen wil toebrengen buiten het eigen gebruikersgebied of gegevens van andere gebruikers wil lezen, zal UAC een waarschuwing geven. Het systeem is hierdoor beter beveiligd."@nl . "Lo User Account Control (UAC - Controllo Account Utente) \u00E8 un modulo software di protezione introdotto da Microsoft a partire da Windows Vista, che gestisce i permessi dei singoli utenti del computer in modo da impedire ai non autorizzati l'esecuzione di software dannoso o il danneggiamento di dati o di componenti del sistema. Uno dei principali difetti delle precedenti versioni dei sistemi Windows era, infatti, legato alla sicurezza e al problema della esecuzione di molti processi e applicazioni in modalit\u00E0 \"amministratore di sistema\"."@it . . . . "User Account Control"@it . . "User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorises an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges and malware are kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorises it. UAC uses Mandatory Integrity Control to isolate running processes with different privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's \"Protected Mode\". Operating systems on mainframes and on servers have differentiated between superusers and userland for decades. This had an obvious security component, but also an administrative component, in that it prevented users from accidentally changing system settings. Early Microsoft home operating-systems (such as MS-DOS, Windows 95-98 and Windows Me) did not have a concept of different user-accounts on the same machine. Subsequent versions of Windows and Microsoft applications encouraged the use of non-administrator user-logons, yet some applications continued to require administrator rights. Microsoft does not certify applications as Windows-compliant if they require administrator privileges; such applications may not use the Windows-compliant logo with their packaging."@en . . . "\u0158\u00EDzen\u00ED u\u017Eivatelsk\u00FDch \u00FA\u010Dt\u016F, anglicky User Account Control, zkr\u00E1cen\u011B UAC, je bezpe\u010Dnostn\u00ED technologie poprv\u00E9 p\u0159edstavena v opera\u010Dn\u00EDm syst\u00E9mu Microsoft Windows Vista. Zvy\u0161uje bezpe\u010Dnost Microsoft Windows omezen\u00EDm opr\u00E1vn\u011Bn\u00ED aplikac\u00EDm na \u00FArove\u0148 u\u017Eivatele dokud administr\u00E1tor nepotvrd\u00ED zv\u00FD\u0161en\u00ED pr\u00E1v aplikace. Pouze aplikace, kter\u00FDm u\u017Eivatel v\u011B\u0159\u00ED, dostanou vy\u0161\u0161\u00ED opr\u00E1vn\u011Bn\u00ED a malwaru je zabr\u00E1n\u011Bno obdr\u017Een\u00ED opr\u00E1vn\u011Bn\u00ED k po\u0161kozen\u00ED syst\u00E9mu. Jin\u00FDmi slovy u\u017Eivatelsk\u00FD \u00FA\u010Det m\u016F\u017Ee m\u00EDt administr\u00E1torsk\u00E1 opr\u00E1vn\u011Bn\u00ED, ale aplikace pou\u0161t\u011Bn\u00E9 u\u017Eivatelem nikoli. Pouze aplikace, u kter\u00FDch bylo p\u0159edem nastavena vy\u0161\u0161\u00ED opr\u00E1vn\u011Bn\u00ED, nebo ty kter\u00E9 u\u017Eivatel do\u010Dasn\u011B povol\u00ED na dotaz syst\u00E9mu."@cs . . "4359671"^^ . . . . . . "\u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0443\u0447\u0451\u0442\u043D\u044B\u0445 \u0437\u0430\u043F\u0438\u0441\u0435\u0439 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439 (\u0430\u043D\u0433\u043B. User Account Control, UAC) \u2014 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u043E\u043F\u0435\u0440\u0430\u0446\u0438\u043E\u043D\u043D\u044B\u0445 \u0441\u0438\u0441\u0442\u0435\u043C Microsoft Windows, \u0432\u043F\u0435\u0440\u0432\u044B\u0435 \u043F\u043E\u044F\u0432\u0438\u0432\u0448\u0438\u0439\u0441\u044F \u0432 Windows Vista. \u042D\u0442\u043E\u0442 \u043A\u043E\u043C\u043F\u043E\u043D\u0435\u043D\u0442 \u0437\u0430\u043F\u0440\u0430\u0448\u0438\u0432\u0430\u0435\u0442 \u043F\u043E\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439, \u0442\u0440\u0435\u0431\u0443\u044E\u0449\u0438\u0445 \u043F\u0440\u0430\u0432 \u0430\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u0430, \u0432 \u0446\u0435\u043B\u044F\u0445 \u0437\u0430\u0449\u0438\u0442\u044B \u043E\u0442 \u043D\u0435\u0441\u0430\u043D\u043A\u0446\u0438\u043E\u043D\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u043E\u0433\u043E \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u044F \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430. \u0410\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430 \u043C\u043E\u0436\u0435\u0442 \u043E\u0442\u043A\u043B\u044E\u0447\u0438\u0442\u044C \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0443\u0447\u0451\u0442\u043D\u044B\u0445 \u0437\u0430\u043F\u0438\u0441\u0435\u0439 \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439 \u0432 \u041F\u0430\u043D\u0435\u043B\u0438 \u0443\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u0438\u044F."@ru . "\u30E6\u30FC\u30B6\u30FC\u30A2\u30AB\u30A6\u30F3\u30C8\u5236\u5FA1 (User Account Control, UAC) \u306F\u3001Windows Vista\u4EE5\u964D\u3088\u308A\u5C0E\u5165\u3055\u308C\u305F\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u306E\u57FA\u76E4\u3068\u306A\u308B\u6280\u8853\u3067\u3042\u308B\u3002\u8A31\u53EF\u306E\u306A\u3044\u9650\u308A\u30A2\u30D7\u30EA\u30B1\u30FC\u30B7\u30E7\u30F3\u3092\u6A19\u6E96\u30E6\u30FC\u30B6\u30FC\u306E\u6A29\u9650\u3067\u52D5\u304B\u3059\u3053\u3068\u3067\u3001\u4E0D\u7528\u610F\u306B\u30DE\u30EB\u30A6\u30A7\u30A2\u306A\u3069\u304C\u30AA\u30DA\u30EC\u30FC\u30C6\u30A3\u30F3\u30B0\u30B7\u30B9\u30C6\u30E0 (OS) \u306B\u5909\u66F4\u3092\u52A0\u3048\u3089\u308C\u306A\u3044\u3088\u3046\u306B\u3059\u308B\u72D9\u3044\u304C\u3042\u308B\u3002"@ja . . . . . . . . "\uC0AC\uC6A9\uC790 \uACC4\uC815 \uCEE8\uD2B8\uB864"@ko . . "\u30E6\u30FC\u30B6\u30FC\u30A2\u30AB\u30A6\u30F3\u30C8\u5236\u5FA1 (User Account Control, UAC) \u306F\u3001Windows Vista\u4EE5\u964D\u3088\u308A\u5C0E\u5165\u3055\u308C\u305F\u30BB\u30AD\u30E5\u30EA\u30C6\u30A3\u306E\u57FA\u76E4\u3068\u306A\u308B\u6280\u8853\u3067\u3042\u308B\u3002\u8A31\u53EF\u306E\u306A\u3044\u9650\u308A\u30A2\u30D7\u30EA\u30B1\u30FC\u30B7\u30E7\u30F3\u3092\u6A19\u6E96\u30E6\u30FC\u30B6\u30FC\u306E\u6A29\u9650\u3067\u52D5\u304B\u3059\u3053\u3068\u3067\u3001\u4E0D\u7528\u610F\u306B\u30DE\u30EB\u30A6\u30A7\u30A2\u306A\u3069\u304C\u30AA\u30DA\u30EC\u30FC\u30C6\u30A3\u30F3\u30B0\u30B7\u30B9\u30C6\u30E0 (OS) \u306B\u5909\u66F4\u3092\u52A0\u3048\u3089\u308C\u306A\u3044\u3088\u3046\u306B\u3059\u308B\u72D9\u3044\u304C\u3042\u308B\u3002"@ja . . . . . "Control de cuentas de usuario"@es . . . . . . "Kontrola konta u\u017Cytkownika (ang. User Account Control, UAC) \u2013 komponent ochronny wprowadzony w systemie operacyjnym Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 i Windows 11. W za\u0142o\u017Ceniu mia\u0142 poprawia\u0107 bezpiecze\u0144stwo system\u00F3w Windows poprzez ograniczanie dost\u0119pu aplikacji do dzia\u0142ania tak d\u0142ugo, a\u017C administrator systemu nie autoryzuje dla nich dost\u0119pu i w efekcie zapobiega\u0107 wykonaniu kodu bez zezwolenia u\u017Cytkownika. Pod tym wzgl\u0119dem rozwi\u0105zanie to jest bardzo podobne do tego zastosowanego w systemach uniksopodobnych (poprzez sudo)."@pl . . . . . . . "User Account Control (UAC, \u00AB contr\u00F4le du compte de l'utilisateur \u00BB) est un m\u00E9canisme de protection des donn\u00E9es introduit dans les syst\u00E8mes d'exploitation Windows Vista et 7. UAC est aussi connu sous ses d\u00E9nominations pr\u00E9c\u00E9dentes durant le d\u00E9veloppement de Windows Vista, \u00E0 savoir UAP (User Account Protection) et LUP (Least User Privilege)."@fr . . . . "Benutzerkontensteuerung"@de . . "User Account Control"@en . .