Here are the screenshots of my UAC test!
Start the Ncat Hacking Tool!
Then run a fake 1980's Pacman game!
This fake error message before Spyware!
Connection back to the attackers PC!
Whats this a porn picture?
Nope just a fake picture as a key log file!
Clear the log file!
I can even infect startup without the Registry wow!
Verdict!
I have also made this Pacman game into a Trojan Dropper as well, so it's just like a ninja in your startup folder without any errors showing up in example. As shown you can bypass the UAC totally, because you still have limited write access to your hard disk. The most of basic protection can stop this write access say a simple HIPS! But if I have found security flaws in Spy Shelter what about VoodooShield 1.30? Applocker should protect you even better for 100% free and Spy Shelter works great only, If you terminate all of the Spyware processes? because of the Reverse Shell connection still lives on your computer after being blacklisted with Spy Shelter. Because the reason why Spy Shelter got bypassed is because it's more than one exploit in one binary file!