MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. ×
Search the Community
Showing results for tags 'permissions'.
Someone brought me a Win 8 system that gives a UAC prompt when moving files within the user directory, say from Pictures to a subfolder or the Desktop. It would seem ownership/permissions have been screwed up. I ran the Tweaking.com repair tool to reset permissions (only option was the entirety of C:\ so it took forever) and it seemed to fix the problem temporarily, but must have un-fixed after a reboot. Malware scans are coming up clean, starting to suspect the user account has been corrupted but need a second opinion.
On my external disk i have a 'WindowsImageBackup' and 'FileHistory' folder and as a user i am not allowed to look in these folders. I even can not see what permissions are given. Is it still possible, for a ransomware virus, to encrypt the backup files? or should i 'unmount' the disk and 'mount' again to make the next backup? And what system accounts are allowed to use these folders? If i force my way in then something [account] is added and i do not get a warning message.
Using a single console command line, we need to deny SYSTEM account access to a specific registry key. Subinacl worked for that without issues on past operating systems, but it doesn't seem to behave properly with Windows 10 x64, and other sources are reporting the same. SetACL doesn't seem to know anything about denying permissions on registry, or I couldn't find the proper syntax for it. How you guys would recommend us to achieve this?