You can open Local Security Policy (secpol.msc) -> Local Policy -> Security Options. Enable the setting: "User Account Control: Only elevate executables that are signed and validated". Once enabled, only signed EXEs are allowed by Windows to elevate. Others will fail with the error message: "A referral was returned from the server."
This will provide you with pretty good security as no app besides the ones that are either digitally signed will be able to run on your PC. Without admin privileges, the damage that malware can cause is limited.
This method is not without its flaws. Many useful apps are not signed so you will be unable to run those which require admin permissions. Some programs like file copy utilities or shell extensions need to self-elevate and cannot be run manually or from the command line. You will not be able to run such rare programs but the tradeoff is that your Windows system will be highly secure.
You can run such unsigned apps that require admin permissions using Windows Task Scheduler:
http://winaero.com/blog/open-any-progra ... ac-prompt/