@Peter:
informieren hilft:
http://en.wikipedia.org/wiki/Securit...ccount_Control
Ich zitiere:
Aus dem Wikipedia-Artikel:
Many applications break for standard users (non-admins) today because they attempt to write to protected areas that the standard user does not have
access to.
UAC will improve application compatibility for these users by redirecting writes (and subsequent reads) to a per-user location within the user’s profile. For example, if an application attempts to write to “C:\program files\appname\settings.ini” and the user doesn’t have permissions to write to that directory, the write will get redirected to “C:\Users\username\AppData\Local\VirtualStore\Prog
ram Files\appname\.” To make it easier to find these redirected files has been added a new button to Windows Explorer. If there is a virtualized version of a file related to the current directory, a Compatibility Files button appears that will take you to the virtual location to view that file.
Natuerlich funktioniert das nur bei aktiviertem
UAC; bei deaktiviertem
UAC hast du auf den Programm-Ordner den gewohnten Schreibzugriff wenn du Admin bist.
Wird dadurch einiges klarer?
Greetz
alcaeus