The real answer?
“We once gave you commoners this power and you used it to fuck your computer up and then blamed us for it, so we learned you can’t be trusted with this power. We hid it behind a kind of skill test, and you’re failing that test.”
Good luck with opening the subdirectories of C:\WindowsApps\
. I ran Explorer as admin, gave myself R/W permissions, even recursively changed ownership of everything, followed all the online guides… Still denied access.
U can use proccess hacker to lauch for example total commander with SYSTEM privileges it’s highest possible privilege in windows.
@ChaoticNeutralCzech
Tried knoppix?
@Reddfugee42 @programmerhumor
I prefer the answer of giving the giy the reins and letting him get it so riddled with viruses then when he calls for support replying “sorry, your property your problem. You have absolute dominion over it and thus we give no warranty as we have no responsibility.”
Andrew is not very smart. Windows isn’t very good, but he is very clueless. There are legitimate things to complain about, but Andrew just complains.
Windows permissions can be tricky… I’ll give them that. A lot of the tools Microsoft provides are not very straightforward.
However, PowerShell and tools from Sysinternals suite, or open source tools as well, make it a lot easier.
Managing permissions on Linux, especially if doing the ACL thing, can be complicated too. I’ve really never ran into many permission issues myself. psexec has been helpful too when needing to access things as the SYSTEM user and not get those stupid prompts asking me to change permissions for protected folders.
I think Andrew might be a lawyer.
My roommate for a couple years in college was pre-law, and did some internships after graduation but before gaining his own law degree. He mentioned at one point how absolutely and hilariously pervasive it was at the firm he was working for attorneys to just run screaming to IT every single time literally anything was even the slightest bit inconvenient or obtuse (to their understanding). Part of it was the logic of “I bill clients at $800/hr, I am not spending my time to resolve whatever this hiccup is”, but part of it was absolutely also some bullshit power dynamics.
I was married to a lawyer for years. They have to bill somewhere from 1700-2200 hours a year to stay on partner track. And they can’t bill every hour that they’re working (although they can double up sometimes by using the minimum 2/10ths of an hour). My sympathy is with the lawyer. It’s not a power dynamic, it’s how the firm makes money and what you’re there to do.
Andrew is ignorant. He could learn the basics of computer literacy, which would answer all his questions, but I’ll take a shot in the dark and say that Andrew doesn’t want to do that and is perfectly happy being ignorant. And also angry.
Never listen to anyone who is perfectly satisfied with being angry at everything.
“I shouldn’t have to use permissions or sudo, just all root all the time”
“Real Men Run As Root”
I don’t run as root because I’ve always been told I shouldn’t. I don’t know enough about anything to be contradicting stuff like this. It has always seemed weird to me that we don’t run as root and then just sudo everything, though.
What is the reason we don’t run as root?
What is the reason we don’t run as root?
We are human and make mistakes. Not running as root means the computer will ask us to confirm when we are about to do something major (like a software update, or formatting a partition). This reduces the chance of making big mistakes. (But I don’t see why VLC shouldn’t be able to run as root, if the user so desires.)
Because you might accidentally do something which breaks the system, or you might run a program which does something malicious without your knowledge.
By gating dangerous (or protected for any other reason) commands behind sudo, you create a barrier which is difficult to accidentally cross
A big part of it comes from the security model and Linux historically being a multi-user environment. root
owns the root directly /
which is where all of the system files live. A normal user just has access to their own home directory /home/username
and read-only access to things the normal user needs like the /bin
where programs are stored (hence /bin/bash
in lots of bash scripts, it tells the script what program to run the script from)
Because of this model, a normal user can only mess up their own files, while root can mess up everyone’s files and of course make the system non-bootablem. But also you can have user Bob signed in and doing stuff but unable to access user Alice’s files, and user Alice can be doing stuff and even running the same programs that user Bob is running (since it’s read only there’s no conflict) and then the administrator can log in as root
to install something because they got a ticket to install suchandsuch for soandso.
Back to your point with sudo
, sudo
is Super User Do, so you are running a single command as root
. By running it as root you can potentially be messing up with Alice and Bob might be doing, and most importantly whatever you are running with sudo
can potentially affect any file on the computer. So if you run the classic rm -rf /
it will delete every file that the user has write access to, so if bob runs it it’ll delete all of /home/bob/
but Alice will be unaffected, and the admin can still log in as root
to do stuff. But if you run it as root
you’ll quickly find the server unable to boot and both Alice and Bob will be very upset that they can’t access the server or their files
If you host a website you’ll generally take advantage of this by giving the www
folder read-only access so that web users can only see webpages and can’t start reading random system files, or for server software you can create a dedicated user to run that server software as, so if someone were to somehow exploit a vulnerability and gain access to that server user they can only mess up the software and no system files
In defense of Andrew, until windows 10 never had I ever installed a program that made it’s own files untouchable unless you did some real fuckery with permissions.
As soon as they introduced that little warning screen in program files it was clear shit was going downhill for power users.
I discovered basic versions of windows are even more restrictive when I was unable to install my favorite lightweight pdf reader in a friend’s laptop because Windows home just said that for my safety I wasn’t allowed. With no option to bypass this limitation being hinted at.
Ended up installing it anyways but had to run the installer from an admin terminal (luckily it was windows 7 so it was a local account with admin rights instead of a bullshit Microsoft one)
that made it’s own files untouchable
that made its* own files untouchable