home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.msdos.batch      Fun with MS-DOS batch files      42,547 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 42,400 of 42,547   
   Mickey D to Paul   
   Re: windows key + r keys and control + s   
   22 Oct 24 10:24:31   
   
   XPost: alt.comp.os.windows-10, alt.comp.os.windows-11   
   From: mickeydavis078XX@ptd.net   
      
   On Tue, 22 Oct 2024 01:46:04 -0400, Paul wrote:   
      
   >> On Mon, 21 Oct 2024 21:31:03 -0400, Mickey D wrote:   
   >>   
   >>> As you said, any command will be elevated with this method, but I was   
   >>> specifically talking about the command prompt which comes up when you enter   
   >>> "windows + r" and "control + shift + enter" & then "cmd" into the Run box.   
   >>   
   >> Just to be super clear about the sequence, any command will be elevated   
   >> with this method, but I was specifically talking about the command prompt   
   >> which comes up when you enter "windows + r" and "control + shift + enter"   
   >> with "cmd" into the Run box as shown super clearly obviously in the below.   
   >>   
   >> 1. Windows + r   
   >> 2. cmd   
   >> 3. Control + shift + enter   
   >> 4. Yes to the UAC prompt   
   >>   
   >> All I want to do is figure out a way for #4 to not happen.   
   >> Any ideas?   
   >>   
   >> (Other than turning off UAC for all commands - which is not a good idea.)   
   >>   
   >   
   > Well, that's what works, is turning off UAC entirely.   
   >   
   > *******   
   >   
   > There is a second way to run the OS.   
   >   
   > 1) Enable the "real administrator" account.   
   >    Now, there is a home directory for the Administrator.   
   >   
   > 2) Start : Run :    dropmyrights.exe  cmd.exe   
   >   
   > That is an example, of starting the Command Prompt window   
   > in an unelevated state. The "dropmyrights" executable   
   > as far as I know, is third party. I have a couple other utilities   
   > of this sort, which are also third party, and are useful for weird   
   > stuff like that. Todd is the one who posted about this.   
   >   
   > So that's "running upside-down" in a sense. You are always elevated,   
   > except when you specifically want to de-elevate yourself. As an IT   
   > guy, Todd likes this when doing a series of maintenance commands for   
   > a customer. When most of the commands need the elevation, and   
   > only the occasional one needs "dropmyrights.exe" placed in front of it.   
   >   
   > *******   
   >   
   > Windows has had a "sudo" command added. However,   
   > this is likely to be a half-assed job and the UAC prompt   
   > is *still* going to come up. Whether that is in 24H2 only,   
   > or is available as a Feature before 24H2, I don't know.   
   > Personally, I am not placing bets on this feature being   
   > worth my time.   
   >   
   > In Linux, after you authenticate on the first instance of   
   > "sudo" usage, the token is kept for around ten minutes or so.   
   > This means if you enter "sudo notepad.exe" a second time,   
   > you would not be asked for authentication again. However,   
   > the Windows design intent, is to always present the UAC prompt,   
   > even if doing identical things in a row:   
   >   
   >    sudo notepad.exe  UAC prompt, proceed with what you were doing   
   >    sudo notepad.exe  UAC prompt, proceed with what you were doing   
   >    sudo notepad.exe  UAC prompt, proceed with what you were doing   
   >   
   > Because again, the idea is not to refine the presentation of UAC and   
   > make it a minimalist thing. The intention is belt-and-suspenders,   
   > to make sure the user really intended to do this. Even if to any   
   > casual observer, there's no point in doing the second and third one.   
   >   
   > Some day, I'm going to get to see this new "sudo" feature... Maybe   
   > I should fire up the Insider and repair it.   
   >   
   > https://learn.microsoft.com/en-us/windows/sudo/   
   >   
   >     "Because sudo elevates the targeted process to run   
   >      with administrator-level permission, a prompt will   
   >      open asking you to verify that you want to continue." <=== Bwahahaha!!!   
   No shit!   
   >   
      
   Thanks for your advice and helpful assistance in streamlining Windows.   
   I figured out how to bring up an admin command prompt window without UAC.   
      
   At the same time, I streamlined step #3 from 3 keys to only 1 keystroke.   
   Plus I was able to colourize the admin command window to make it obvious.   
      
   BEFORE:   
   1. Windows + r   
   2. cmd   
   3. control + shift + enter   
   4. Yes to UAC   
   5. This opens an administrator command prompt window   
      
   AFTER:   
   1. Windows + r   
   2. admin   
   3. enter   
   4. This opens (a red) administrator command prompt window   
      
   I set it to invoke a red administrator command window with white letters.   
   The reason for those colors is to distinguish between regular cmd windows.   
      
   All I needed was to make a shortcut that pointed to the task scheduler.   
   In taskschd.msc I checked "Run with highest privileges" to skip the UAC.   
      
   Then I added this program to be run when the shortcut calls taskshd.msc.   
   cmd /k "cd /d "C:\Windows\System32" & echo admin: & color 4f"   
      
   Clicking the shortcut opens up a red admin cmd window without invoking UAC.   
   Then I needed a quick way to invoke that shortcut from the Windows Run box.   
      
   So I added an "admin" command in the registry to invoke that shortcut.   
   HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\admin.exe   
   (where admin.exe points to the admin shortcut invoking the admin task).   
      
   With streamlining, I was able to skip not only UAC but multiple keystrokes.   
   Success at last!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca