hmmm..aravind I'm sorry but this is basic for any Windows Programmer anyway.
Msconfig can edit UAC control level, it uses Windows Elevated registry places HKEY_lOCAL_MACHINE. This means we need elevated privileges in the first place to actually "tweak" the registry. Those who are not fmailiar with how to do this:
Sorry about few distracting elements but, as you may see it says we require elevation. Therefore, we need to either exploit UAC framework (Malware way) or get legitimate access (legal applications way). Then on we can carry on.
Once we gain elevated privileges we may move our file to System32 folder which is elevated folder this means we get administrative access every reboot even with HIGHEST level on UAC
. However as you want to "tweak" User Account Control (UAC).
Next, we need to open registry location:
Then set the values to NULL (0) therefore disabling\suppressing UAC to "quite Mode" additionally, you can optionally set ConsentPromptBehaviorAdmin to NULL (0).
This is one method.
Anyway read this:
This is a exploit of UAC and this does not unlike many do complicated methods using undocument functions but rather using simple and straightforward Windows API functions.
Hope this helps.