RH said:
I don't care. I can't put up with this permissions thing. How do I make
myself the Administrator then?
What do you mean "log on" as the Admin? When the PC is turned on I am
logged in so how do log-in as the Admin?
That wont work because when I open the prompt it alread says:
It gives me the version of windows and then:
C:\Users\Breener>
I get the error:
Command not recognized.
So what else can it try?
The PC is W-7, not Vista. How can I shut this crap off alltogether? I
don't care if I'm open to attack.
You can find the tutorial information on other sites. With
a multitude of options for doing it.
http://www.sevenforums.com/tutorials/507-built-administrator-account-enable-disable.html
Be aware, that one change in approach for the newer operating systems, is
the Administrator account is not "God". The security model previously, on
quite a few OSes, was that once you used the Administrator account was used,
restrictions "magically fell away". Then the temptation of all home users,
was to just "run as administrator" all the time, to make a
"flat security model".
On Windows 7, there is an account called "TrustedInstaller". Some things on
your system are owned by TrustedInstaller, and you could still be
denied the simplest of things, because of the account owning the facility.
TrustedInstaller is there, as an account that only a trusted part of the
OS, doing installation work, should be using. The new Windows use multiple
accounts, to try to confound malware.
http://en.wikipedia.org/wiki/Windows_Resource_Protection
"Permission for full access to modify WRP-protected resources is restricted
to the processes using the Windows Modules Installer service
(TrustedInstaller.exe). Administrators no longer have full rights to
system files. Protected resources can be modified or replaced only if
administrators take ownership of the resource and add the appropriate
Access Control Entries (ACEs). The "Trusted Installer" account is used
to secure core operating system files and registry keys. Protected files
and registry keys have an access control list applied that prevents other
user accounts and programs that execute under any other user account except
the TrustedInstaller account from making changes."
If you bump into something like that, you can probably change the
ownership of the pesky facility, to gain access to it. But if you
thought the Administrator account was the "magic carpet" it used
to be, no, its not. For security reasons, lots of things are
less convenient than they could be. And... thats life.
I think, only once so far, I've run into a Registry setting I couldn't
change in regedit, because of the default permissions applied when the
OS was installed. So even when meddling with the Registry, as an
Administrator, you can still run into "resistance". There should
be a way to deal with it, but it takes time.
Disabling UAC, would reduce the number of dialog boxes when attempting
to do stuff. Running as Administrator, would be a separate issue.
And the ownership of critical facilities in Windows by the
TrustedInstaller account, means that the Administrator account
can't run roughshod over everything, instantly. Given time,
you can probably achieve the results you want, but not without
some "hair loss".
http://en.wikipedia.org/wiki/User_Account_Control
"Criticism
There have been complaints that UAC notifications slow down various
tasks on the computer such as the initial installation of software
onto Windows Vista. It is possible to turn off UAC while installing
software, and reenable it at a later time. However, this is not
recommended since, as File & Registry Virtualization is only active
when UAC is turned on, user settings and configuration files may be
installed to a different place (a system directory rather than a
user-specific directory) if UAC is switched off than they would be
otherwise. Also Internet Explorer 7's "Protected Mode", whereby the
browser runs in a sandbox with lower privileges than the standard user,
relies on UAC; and will not function if UAC is disabled."
Could you use some utility, to change the ownership of files so
they're all "Administrator" and fix it that way ? Perhaps. Except
the next time you go to install some new software, the system
facilities used, may notice the security is all wrong. And I don't
know what would happen in that case. Again, on older systems, the
system might not have been sophisticated enough to notice when
you do stuff like that. Like, imagine what would happen if
you needed to install a Service Pack, and the installer
started looking at the setup.
There's more complexity in Windows 7, than I can handle.
Paul