20Consider the very realistic scenario of logging in as administrator (or “root” in Unix systems) and then opening an email message which happens to carry an attached file infected with malware. Any file executed by a user is by default run at that user’s level of privilege because the operating system assumes that is the user’s intent.