How do I get Administrator permissions for Win7 files?
From the Vista system, Microsoft to provide system security, began to emphasize the ownership of Windows files, as well as program Run-time user rights, restricting the program to the system important files tampering. However, this also gives us the usual use of some problems, the same WIndows7 also have permission problems. When we find that some files cannot be modified, we need to get the admin ownership of the file, and then we can modify it as we wish.
The trick we're going to introduce is how to get ownership of a file or folder:
Method One: Add a menu of ownership to the right-click menu for Windows7: The method is not difficult to implement, save the following as a text file, and then modify the file with the extension. reg, double-click the Import registry.
Windows Registry Editor Version 5.00
[Hkey_classes_root*shellrunas]
@= "Administrator gets ownership"
"Noworkingdirectory" = ""
[Hkey_classes_root*shellrunascommand]
@= "cmd.exe/c takeown/f"%1 "&& icacls"%1 "/grant administrators:f"
"Isolatedcommand" = "cmd.exe/c takeown/f"%1 "&& icacls"%1 "/grant administrators:f"
[HKEY_CLASSES_ROOTEXEFILESHELLRUNAS2]
@= "Administrator gets ownership"
"Noworkingdirectory" = ""
[Hkey_classes_rootexefileshellrunas2command]
@= "cmd.exe/c takeown/f"%1 "&& icacls"%1 "/grant administrators:f"
"Isolatedcommand" = "cmd.exe/c takeown/f"%1 "&& icacls"%1 "/grant administrators:f"
[Hkey_classes_rootdirectoryshellrunas]
@= "Administrator gets ownership"
"Noworkingdirectory" = ""
[Hkey_classes_rootdirectoryshellrunascommand]
@= "cmd.exe/c takeown/f"%1 "/r/d y && icacls"%1 "/grant administrators:f/T"
"Isolatedcommand" = "cmd.exe/c takeown/f"%1 "/r/d y && icacls"%1 "/grant administrators:f/T"
Method Two: Use the specialized optimization tool, set up the right button menu.
There are many kinds of optimization tools here, the general Support WindowsVista optimization tools, can be used to optimize the WIndows7, such as Vista optimization master (into the download), Vista Explorer (into the download), Of course, those specially designed to Windows7 optimization software can also achieve the same effect, such as Windows7 optimization master (into the download), Windows7 Explorer and so on. The system settings in these tools, the right key settings have to add the ability to get administrator privileges, here is not detailed, you can find their own.
The powerful features of administrator privileges
1, registry access:
Note: Under non-system permissions, users cannot access certain registry keys, such as "Hkey_local_machinesam", "hkey_local_machinesecurity", and so on. These items record the core data of the system, but some viruses or trojans are frequented here. For example, under the SAM project to create a hidden account with administrator rights, by default, the administrator by typing "NET user" at the command line or in the "Local Users and Groups" (lusrmgr.msc) is not visible, causing the system a great risk. Under SYSTEM permissions, there is no barrier to access to the registry, all hands are exposed!
Action: Open Registry Manager, try to access Hkey_local_machinesam and hkey_local_machinesecurity, and you should now have unrestricted access.
2. Access System Restore files:
Description: System Restore is a kind of self-protection measure of Windows System, it establishes "system Colume Information" folder under each root directory, save some system information for System Restore to use. If you do not want to use System Restore, or if you want to delete some of the files under it, this folder has hidden, System properties, and non-system permissions cannot be deleted. If you are logged on with system privileges you can delete it, even if you can create a file underneath it to protect your privacy.
Action: Click "tools → folder Options" in Resource Manager, in the Folder Options window that pops up, switch to the View tab, undo the Hide protected operating system (recommended) check box in the Advanced Settings list, and then select the Show all files and folders item with hidden files and folders. You then have unrestricted access to the working directory of System Restore C:system Volume information.
3, replace the system files:
Description: Windows system for system files to protect the mechanism, in general, you will not be able to replace the system files, because the system has a system file backup, it exists in C:windowssystem32dllcache (assuming your system installed in C disk). When you replace the system files, the system automatically restores the corresponding system files from this directory. When there is no corresponding system file in the directory pop-up prompts (Figure 8), let you insert the installation disk. In practical applications if you sometimes need to DIY your own system to modify some of the system files, or with a high version of the system files to replace the lower version of the system files, so that the system functions. Windows XP, for example, only supports a single user telnet, if you want it to support multiple users telnet. You want to replace the corresponding file for window XP with a remote login file for Windows 2003. This is difficult to implement under non-system permissions, but can be easily implemented under system permissions.
Action: Extract the Termsrv.dll file from the Windows 2003 System and replace the file with the same name under Windows XP C:windowssystem32 with the file. (For WINDOWS XP SP2 You must also replace files of the same name under c:windows$ntservicepackuninstall$ and c:windowsservicepackfilesi386 directories). The appropriate system settings will allow Windows XP to support multiple user logons.
4, Manual antivirus:
Description: Users in the process of using the computer is generally used by the administrator or other Admin user login, poisoning or after the horse, viruses, Trojans are mostly run with administrator rights. We are in the system after poisoning is generally used anti-virus software to antivirus, if you kill soft paralysis, or anti-virus software can only detect, but can not clear, this time can only shirtless, manual antivirus. Under the Adinistrator authority, if the manual killing for some viruses powerless, generally to boot into safe mode, sometimes even in safe mode can not clean. If you are logged on with system privileges, it is much easier to get a virus.
Action: (Take a manual antivirus as an example, I in order to screenshot in the virtual machine simulation on the previous period of time a manual antivirus. The "Windows Task Manager", found that there is a suspicious process "86a01.exe", the administrator can not end the process (Figure 9), of course, can not remove the virus in the system directory of the original file "86a01.exe." Log in to System privileges, the process is successfully completed, and then the virus original file is removed, the registry is cleared of relevant options, and the virus is completely cleaned out of the system.