Greetings, LRN!
>>> Again, there's simply no equivalent of "god user" from *NIX in Windows
>>> permissions system.
>>
>> That's not really correct. An account that is a member of the
>> Administrators local group (localized name can be different, SID is
>> S-1-5-32-544) is a root/superuser equiva
On 09.05.2019 17:44, Bill Stewart wrote:
> On Thu, May 9, 2019 at 6:20 AM Andrey Repin wrote:
>
>> Again, there's simply no equivalent of "god user" from *NIX in Windows
>> permissions system.
>
> That's not really correct. An account that is a member of the
> Administrators local group (localize
On Thu, May 9, 2019 at 6:20 AM Andrey Repin wrote:
> Again, there's simply no equivalent of "god user" from *NIX in Windows
> permissions system.
That's not really correct. An account that is a member of the
Administrators local group (localized name can be different, SID is
S-1-5-32-544) is a ro
Greetings, LRN!
>>> And the group "None". I found it mentioned in ntsec. Would it be
>>> possible to create a group "root" in Windows which gives it's
>>> members the same power as the group Administrators? And why "None"
>>> and not "Administrators"?
>>
>> Administrators do not have all possible
On 09.05.2019 15:09, Andrey Repin wrote:
> Greetings, Henning!
>
>> And the group "None". I found it mentioned in ntsec. Would it be
>> possible to create a group "root" in Windows which gives it's
>> members the same power as the group Administrators? And why "None"
>> and not "Administrators"?
>
Greetings, Henning!
> And the group "None". I found it mentioned in ntsec. Would it be
> possible to create a group "root" in Windows which gives it's
> members the same power as the group Administrators? And why "None"
> and not "Administrators"?
Administrators do not have all possible permissio
This is in response to Erik Soderquist's response. I happened to
delete the mail, so the citations may not look properly. Sorry for
the inconvenience.
> On Windows, UID 0 does not exist
yes, I am (and were) fully aware of that. But see below.
> trying to force UID 0 I would expect to result in l
Greetings, Henning!
> In order to not be misunderstood: the question is not about executing
> a single command as a priviledged user.
> Instead, I'm asking how to get rid the annoying Unknown+User and
> Unknown+Group with six digits IDs permanently.
This is not possible. Windows permissions sys
On 5/8/2019 9:50 AM, Henning wrote:
In order to not be misunderstood: the question is not about executing
a single command as a priviledged user.
Instead, I'm asking how to get rid the annoying Unknown+User and
Unknown+GroupĀ with six digits IDs permanently.
I'm assuming you want to be root
On Wed, May 8, 2019 at 9:50 AM Henning wrote:
>
> In order to not be misunderstood: the question is not about executing
> a single command as a priviledged user.
>
> Instead, I'm asking how to get rid the annoying Unknown+User and
> Unknown+Group with six digits IDs permanently.
This indicates us
In order to not be misunderstood: the question is not about executing
a single command as a priviledged user.
Instead, I'm asking how to get rid the annoying Unknown+User and
Unknown+Group with six digits IDs permanently.
What I've tried so far:
1. put USER=root and HOME=/root
This gave me
11 matches
Mail list logo