metro2012 Posted May 18, 2012 Share Posted May 18, 2012 Hey How do I make a normal CMD command prompt into a administrator CMD command prompt? I understand perfectly that it will ask for my permission (and/or username and password) but thats OK. I just want the su or sudo -i equivilent. Thanks! Link to comment Share on other sites More sharing options...
MarkusDarkus Posted May 18, 2012 Share Posted May 18, 2012 Right click Command prompt icon and select "Run as Administrator" Or am I missing something here? Link to comment Share on other sites More sharing options...
Brandon Live Veteran Posted May 18, 2012 Veteran Share Posted May 18, 2012 You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option. Link to comment Share on other sites More sharing options...
Ottawa Gamerz Posted May 18, 2012 Share Posted May 18, 2012 yes u can go to start all programs accessories find the cmd right click run as admin now.. just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click Link to comment Share on other sites More sharing options...
smooth_criminal1990 Posted May 18, 2012 Share Posted May 18, 2012 you want the RUNAS command, to run a command as another user. It works vaguely like sudo, run it without any arguments for usage info Link to comment Share on other sites More sharing options...
Eric Veteran Posted May 18, 2012 Veteran Share Posted May 18, 2012 You can also quickly initiate an elevated CMD prompt by typing "CMD" into the start menu search box and hitting Ctrl-Shift-Enter to run it. Thunderbuck, insanelyapple, Obi-Wan Kenobi and 1 other 4 Share Link to comment Share on other sites More sharing options...
metro2012 Posted May 21, 2012 Author Share Posted May 21, 2012 yes, most have missed something but some have gotten it :p You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option. Basically this is the best answer to the problem at hand. thank you. Link to comment Share on other sites More sharing options...
+LogicalApex MVC Posted May 21, 2012 MVC Share Posted May 21, 2012 This is the feature I most wish they would add... Nothing more annoying than firing up the command prompt then having to kill it off and do it over... You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option. It could spawn a new instance of CMD with the elevated permissions (firing up the UAC dialog and the like)... Link to comment Share on other sites More sharing options...
Shane Nokes Posted November 3, 2012 Share Posted November 3, 2012 yes u can go to start all programs accessories find the cmd right click run as admin now.. just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click Yes, but as Brandon said all that does is just start a new instance...so no it does not elevate the current running CMD Prompt window. Link to comment Share on other sites More sharing options...
Obi-Wan Kenobi Posted November 3, 2012 Share Posted November 3, 2012 IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;) I mean, banking on the fact that most users don't use a limited account from the beginning of their installs...I say MOST, I myself have limited accounts on everything I own excluding my server, that I administrate, and nobody has the password to....just throwing that out there... Link to comment Share on other sites More sharing options...
Shane Nokes Posted November 3, 2012 Share Posted November 3, 2012 IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;) Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure. Obi-Wan Kenobi 1 Share Link to comment Share on other sites More sharing options...
MS Bob 11 Posted November 3, 2012 Share Posted November 3, 2012 Use ele.exe from Winaero: http://winaero.com/comment.php?comment.news.24 Karl L. 1 Share Link to comment Share on other sites More sharing options...
Colin McGregor Posted November 3, 2012 Share Posted November 3, 2012 Been a while since I've been in windows 7 im used to just windows 8 and just right clicking bottom left corner and hitting command prompt admin but I think you can type cmd in the start menus search, right click it and high run as admin Link to comment Share on other sites More sharing options...
Obi-Wan Kenobi Posted November 3, 2012 Share Posted November 3, 2012 Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure. Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;) Link to comment Share on other sites More sharing options...
Shane Nokes Posted November 3, 2012 Share Posted November 3, 2012 Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;) Oh yes I wasn't saying that. I was just saying that either route provides about the same security. I wasn't questioning your practices. :) Link to comment Share on other sites More sharing options...
Obi-Wan Kenobi Posted November 3, 2012 Share Posted November 3, 2012 @Shane, and BudMan....I appreciate everything microsoft and BudMan has taught me...even though he (budman) might not have been here for me all the way, physically, but I DO take notes. Thank you for the fine, awesome job you do at microsoft, and I'll forever appreciate it. I was just saying, malware/viruses/compromistation has never bitten me in the bootay, and I don't plan on it starting now. I don't say much on neowin, but I do know that what I've learned has kept my systems MORE than secure...need I say, UAC FTW? Keep up the great work, buddy. Keep on educating people....as long as you do, it'll keep people like me and their networks secure. Not saying that anything bad couldn't happen to someone OR me...I'm sure it does, but it helps to be educated in the right prevention steps, by the right people. This is why I love neowin! Different strokes for different folks! Thank you, Shane! You should get more recognition than you do! Hey, Neowin...LISTEN TO THIS GUY! Just saying, it could stop some trouble in the future! (Thank you too, BudMan, for all of your networking skills...everything you say matters to at least someone who is worthy to listen!) Link to comment Share on other sites More sharing options...
Shane Nokes Posted November 3, 2012 Share Posted November 3, 2012 Thank you. I wish more people would listen sometimes, but at the same time being slapped down a lot keeps me at least 5-10% humble. ;) Link to comment Share on other sites More sharing options...
John S. Veteran Posted November 3, 2012 Veteran Share Posted November 3, 2012 I'd say this necro-ed thread from May by a banned member can safely be closed Link to comment Share on other sites More sharing options...
Recommended Posts