When deleting files in Windows, the system prompts that access is denied (insufficient permissions ).

Source: Internet
Author: User

When Windows deletes a file, it prompts that access is denied (insufficient permissions) to solve this problem, when deleting an object, the system prompts that access to the object is denied. The permission provided by XXX can be changed. For the average person, the first thing to do in this situation is to right-click-force Delete ...... It is estimated that there are not a few students who use 360 or other similar software. This method should be able to delete these files. If you do not have this option in the right-click menu, you may use other tools that can force delete files. In my opinion, A more general way to solve this problem is to change the File Permission, right-click the file -- properties -- Security -- edit. Modify the File Permission. If you are prompted that the permission cannot be modified, first modify the file owner and right-click the file -- Security -- Advanced -- owner ...... However, when there is more than one such file, such operations will not be real. Therefore, we will briefly introduce two tools: takeown and cacls takeown, which allow administrators to regain access to previously denied files by re-assigning File Ownership. Parameter:/S system specifies the remote system to connect. /U [domain \] user specifies the user context, and the command is executed in this context. /P [password] specifies the password for the given user context. If this parameter is omitted, a prompt is displayed. /F filename specifies the file name or directory name mode. You can use the wildcard "*" to specify the mode. Share Name \ file name is allowed. /A gives ownership to the Administrator group instead of the current user. /R recursion: indicates that the tool runs on files in the specified directory and subdirectory. /D prompt if the current user does not have the "List Folders" permission in a directory, use the default answer. This happens when recursive (/R) operations are performed in sub-directories. Use the valid value "Y" to obtain ownership or use "N" to skip. Below are several common examples of TAKEOWN/F lostfile: Give the lostfile ownership to the current user TAKEOWN/F directory/R/:: recursively grant all the permissions of files in the directory to the Administrator Group TAKEOWN/F *: Give all files in the current directory ownership to the current user TAKEOWN/F % windir % \*. txtcacls is used to display or modify the access control list of files. Parameter: CACLS filename [/T] [/M] [/L] [/S [: SDDL] [/E] [/C] [/G user: perm] [/R user [...] [/P user: perm [...] [/D user [...] filename displays the ACL. /T to change the ACL of the specified file in the current directory and all its subdirectories. /L changes the ACL/S of the volume loaded to the directory against the target to display the SDDL string of the DACL. /S: SDDL replaces the ACL with the ACL specified in the SDDL string. (/E,/G,/R,/P, or/D is invalid ). /E. Edit the ACL without replacing it. /C continues when an access denial error occurs. /G user: perm grants the specified user access permission. Perm can be: R read W Write C Change (write) F full control/R user revoke the access permission of the specified user (only valid when used with/E ). /P user: perm replaces the access permission of the specified user. Perm can be: N no R read W Write C Change (write) F full control/D user decline access of the specified user. You can use wildcards to specify multiple files in the command. You can also specify multiple users in the command. Abbreviation: CI-container inheritance. ACE will be inherited by the Directory. OI-Object Inheritance. ACE will be inherited by the file. IO-only inherit. ACE is not applicable to the current file/directory. ID-inherited. ACE inherits from the ACL of the parent directory. For example, cacls filename/E/P Administrators: F. Change the Administrative Authority's access permission to filename to full control of cacls */E/C/P Administrators: f. Change the access permission of Administrators to full control over all files. With these two commands, you can obtain the ownership of the files in batches and delete the files normally.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.