"In addition, users should deny any UAC request unless they are making modifications to their own system." . . . .