Since I don't understand the language this is what I've gathered from the video. The author created a program to bypass and/or kill EAM and ran it with elevated rights. In the end he was successful.
So if you want to be protected, all you need to do is answer the UAC prompt with no. If a bypass is so powerful that I have to run it deliberately and grant it admin rights, I am not so scared.