18 posts in this topic

Posted

Hey

How do I make a normal CMD command prompt into a administrator CMD command prompt? I understand perfectly that it will ask for my permission (and/or username and password) but thats OK. I just want the su or sudo -i equivilent. Thanks!

Share this post


Link to post
Share on other sites

Posted

Right click Command prompt icon and select "Run as Administrator"

Or am I missing something here?

Share this post


Link to post
Share on other sites

Posted

You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option.

Share this post


Link to post
Share on other sites

Posted

yes u can go to start all programs accessories find the cmd right click run as admin now..

just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click

Share this post


Link to post
Share on other sites

Posted

you want the RUNAS command, to run a command as another user. It works vaguely like sudo, run it without any arguments for usage info

Share this post


Link to post
Share on other sites

Posted

You can also quickly initiate an elevated CMD prompt by typing "CMD" into the start menu search box and hitting Ctrl-Shift-Enter to run it.
4 people like this

Share this post


Link to post
Share on other sites

Posted

yes, most have missed something but some have gotten it :p

[quote]
[color=#282828]You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option. [/color]

[color=#282828][/quote][/color]
[color=#282828]Basically this is the best answer to the problem at hand. thank you.[/color]

Share this post


Link to post
Share on other sites

Posted

This is the feature I most wish they would add... Nothing more annoying than firing up the command prompt then having to kill it off and do it over...

[quote name='Brandon Live' timestamp='1337356554' post='594873821']
You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option.
[/quote]

It could spawn a new instance of CMD with the elevated permissions (firing up the UAC dialog and the like)...

Share this post


Link to post
Share on other sites

Posted

[quote name='Ottawa Gamerz' timestamp='1337358130' post='594873861']
yes u can go to start all programs accessories find the cmd right click run as admin now..

just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click
[/quote]

Yes, but as Brandon said all that does is just start a new instance...so no it does not elevate the current running CMD Prompt window.

Share this post


Link to post
Share on other sites

Posted

IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;) I mean, banking on the fact that most users don't use a limited account from the beginning of their installs...I say MOST, I myself have limited accounts on everything I own excluding my server, that I administrate, and nobody has the password to....just throwing that out there...

Share this post


Link to post
Share on other sites

Posted

[quote name='obiwankenobi' timestamp='1351913392' post='595293643']
IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;)
[/quote]

Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure.
1 person likes this

Share this post


Link to post
Share on other sites

Posted

Use ele.exe from Winaero: [url="http://winaero.com/comment.php?comment.news.24"]http://winaero.com/comment.php?comment.news.24[/url]
1 person likes this

Share this post


Link to post
Share on other sites

Posted

Been a while since I've been in windows 7 im used to just windows 8 and just right clicking bottom left corner and hitting command prompt admin but I think you can type cmd in the start menus search, right click it and high run as admin

Share this post


Link to post
Share on other sites

Posted

[quote name='Shane Nokes' timestamp='1351913671' post='595293649']
Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure.
[/quote]
Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;)

Share this post


Link to post
Share on other sites

Posted

[quote name='obiwankenobi' timestamp='1351915117' post='595293693']
Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;)
[/quote]

Oh yes I wasn't saying that. I was just saying that either route provides about the same security. I wasn't questioning your practices. :)

Share this post


Link to post
Share on other sites

Posted

@Shane, and BudMan....I appreciate everything microsoft and BudMan has taught me...even though he (budman) might not have been here for me all the way, physically, but I DO take notes. Thank you for the fine, awesome job you do at microsoft, and I'll forever appreciate it. I was just saying, malware/viruses/compromistation has never bitten me in the bootay, and I don't plan on it starting now. I don't say much on neowin, but I do know that what I've learned has kept my systems MORE than secure...need I say, UAC FTW? Keep up the great work, buddy. Keep on educating people....as long as you do, it'll keep people like me and their networks secure. Not saying that anything bad couldn't happen to someone OR me...I'm sure it does, but it helps to be educated in the right prevention steps, by the right people. This is why I love neowin! Different strokes for different folks! Thank you, Shane! You should get more recognition than you do! Hey, Neowin...LISTEN TO THIS GUY! Just saying, it could stop some trouble in the future! (Thank you too, BudMan, for all of your networking skills...everything you say matters to at least someone who is worthy to listen!)

Share this post


Link to post
Share on other sites

Posted

Thank you. I wish more people would listen sometimes, but at the same time being slapped down a lot keeps me at least 5-10% humble. ;)

Share this post


Link to post
Share on other sites

Posted

I'd say this necro-ed thread from May by a banned member can safely be closed

Share this post


Link to post
Share on other sites
This topic is now closed to further replies.
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.