153 points

Anyone who has to use Windows and suffers this, PowerToys is your friend. Locksmith identifies what’s locking your file and allows you to free it up. Dunno why PowerToys isn’t bundled by default tbh.

permalink
report
reply
110 points

Dunno why PowerToys isn’t bundled by default tbh.

PowerToys give the user more power, which goes directly against Microsoft’s own goal.

Also, less seriously, “toys” implies the user might enjoy the experience, and you know they can’t let that happen.

permalink
report
parent
reply
-29 points

Shut up. It is literally made by Microsoft. As a place to experiment what to include in Windows. Don’t argue with strawmen

permalink
report
parent
reply
30 points

Shut up. I also think power toys that feature basic functionality and have been around for decades should be included in Windows. I can’t always install this on a computer that needs it.

permalink
report
parent
reply
-5 points

It’s a Linux circlejerk community, what did you expect?

permalink
report
parent
reply
48 points

Cause they’re too busy finding new ways to bundle ads.

permalink
report
parent
reply
11 points

Also please pre-install the sysinternals suite, thanks

permalink
report
parent
reply
11 points

Psexec can be pretty dangerous. Psexec.exe -i -s gives you access to the NTAUTHORITY/SYSTEM account, which is higher than Administrator. One time at work I was trying to do something and was getting permission denied so I decided to use that to get around the problem, I got to spend the afternoon talking to our security administrator because he got a bunch of alerts from our antivirus.

permalink
report
parent
reply
15 points

Well that was the mistake. The first thing you do with SYSTEM is disable the security software.

permalink
report
parent
reply
5 points

Never thought about that, but since these tools just work, when you copy them to your PC… how does psexec do that? It’d either need you to be an administrator (and then it’s not really a privilege escalation as you could have registered any program into the task scheduler or as a service to run as SYSTEM) or it’d need a delegate service, that should only be available when you use an installer - which again wasn’t was has been done when just copying the tool.

permalink
report
parent
reply
9 points

There’s a list of locked files under shares in computer management

permalink
report
parent
reply
4 points

Because it’s still in development, but afaik it is the goal to include it once it’s stable.

permalink
report
parent
reply
4 points
*

I recently discovered Resource Monitor (resmon) can do that, too!

I was using Unlocker waaaay back, I loved it. Since then I wasn’t looking for alternatives, but since resmon also can do that, it’s more than enough.

permalink
report
parent
reply
3 points

I always thought it wasn’t included by default to mitigate malware damage to a system. Malware needs to be just a little bit more advanced if it can’t hijack Powertools to do what it wants

permalink
report
parent
reply
4 points
*

Any self-respecting malware writer will download and decompile the Powertools to find out what API calls are being used. Especially if they’re calls to an undocumented API.

Having Powertools on your computer is thus not the security hole it might appear to be.

The fact they exist at all - well that’s not really a security hole either. Their existence just more quickly dissolves any security-by-obscurity that might have existed. Someone would have found those calls another way.

One might suppose that they contain something special that’s not in the stock OS, but then we’re back to the malware writer’s reverse engineering which would lead them to learn and implement their own versions of whatever it is that Powertools does.

permalink
report
parent
reply
6 points
*

will download and decompile the Powertools

PowerToys is open-source, so no need to decompile. https://github.com/microsoft/PowerToys.

This is the code that determines which processes are holding on to the specified files (or any files in the specified folders): https://github.com/microsoft/PowerToys/blob/a89f9f69768ace73de21dbf6020bd7fa2460bf4a/src/modules/FileLocksmith/FileLocksmithLibInterop/FileLocksmith.cpp#L18

Called from the UI code here: https://github.com/microsoft/PowerToys/blob/a89f9f69768ace73de21dbf6020bd7fa2460bf4a/src/modules/FileLocksmith/FileLocksmithUI/ViewModels/MainViewModel.cs#L112 which also has the code to kill the processes

permalink
report
parent
reply
2 points

I would not say

any self-respecting malware writer will download [powertools] and…

I’m not as familiar with mass-market malware, but APT-level gear generally doesn’t try to make use of such easily observed events. The more network traffic malware appropriates, the greater the probability that it’s caught.

Simply put, Powertools puts several functions within arms reach for malware looking to stay under the radar. Without it, malware needs to bring more of its own code which increases footprint. Living off the land exploits in particular love the presence of these kinds of programs

permalink
report
parent
reply
2 points

They definitely don’t go through the same amount of QA as other apps.

permalink
report
parent
reply
1 point

I just use process hacker and the handles part of it

permalink
report
parent
reply
80 points
*

mv: cannot move 'a' to 'b': Device or resource busy

permalink
report
reply
31 points

sudo?

permalink
report
parent
reply
22 points

sudo!

permalink
report
parent
reply
4 points
*
Deleted by creator
permalink
report
parent
reply
66 points

Sorry, but disk erasure is not available in the trial version of Disk© Partition® Wizard™ 2002. To use this feature, please upgrade to Disk© Partition® Wizard™ Pro 2002 for just $49.99 at Whythefuckdoievenneedthis.co.uk/shop

permalink
report
reply
35 points

Nowadays it would be $19.99 per month and it’s a one year contract that renews three months before expiration.

permalink
report
parent
reply
2 points

And you lose the 3 months if you cancel before renewal

permalink
report
parent
reply
59 points

My first attempt at running Arch, I managed to fuck it up so badly that I had to write a script to write zeros to every bit of my HDD. Fun times.

permalink
report
reply
76 points

Wtf did you do lol I’m scared

permalink
report
parent
reply
42 points
*

Honestly don’t even remember, but it was in my peak “know enough to be dangerous” days in college. I almost certainly didn’t have to go that nuclear to fix it, but that’s what I did.

Take 2 of Arch, after that wipe was completed, went pretty well. It revived an old piece of shit laptop for another few years before its motherboard gave out.

permalink
report
parent
reply
16 points

I’ll wager guess it was something to do with confusing GPT and MBR partitioning. There was a time where some BIOSs and loaders only understood or preferred one over the other, leading to weird incongruences depending on what you’re using to look at the disk. You have to actually overwrite the partition tables to get a clean start.

permalink
report
parent
reply
55 points

“oh you want to delete your entire root directory lol go right ahead”

permalink
report
reply
37 points

I think it asks “Are you sure?” now first.

permalink
report
parent
reply
27 points

Not if you indicate you are sure in advance

permalink
report
parent
reply
1 point

You forgot the Spiderman quote

permalink
report
parent
reply
8 points

‘rm -rf /*’ for the win. I was on a production system when I learned I used that combo far too much. Thankfully, lots were deleted and my crimes were never detected.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

Hint: :q!


Sister communities:

Community rules (click to expand)

1. Follow the site-wide rules
2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of “peasantry” to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
4. No recent reposts
  • Everybody uses Arch btw, can’t quit Vim, and wants to interject for a moment. You can stop now.

Please report posts and comments that break these rules!

Community stats

  • 6.6K

    Monthly active users

  • 1.3K

    Posts

  • 69K

    Comments