It’s the same for Linux though, if you mount any drive, your user or rather UID/GID needs appropriate permissions to perform any action. Can even happen that you mount a disk with your old home directory somewhere and can’t access it because your UID changed between installations (though it’s 1000 for most people).
You can nuke a linux-permission-controlled folder from an account that does not have that permission? How did you misconfigure your linux to allow that?!
Yeah of course that works. If you disable the entire permission framework, naturally permissions can no longer stop you (this is where something like Bitlocker would step in so that even if someone takes the physical drive out they cannot just read from it).
But importantly the same would of course work the other way around. Linux permissions mean fuck all if there’s no Linux around to enforce them, you can just delete whatever then.
but thats the thing that confuses me, what is the point of these permissions if you can just go around them with another os? this is just a limitation for windows itself, i dont get it
You’re a sysadmin, you’ll figure it out one day. But here’s a clue : why would you need to protect a windows folder from being written into by windows-based malwares from a linux OS ?
You can use a tool called “winaero tweaker” and there enable an option called “take ownership” then when you right click the folder, you can take ownership of it and do whatever you want with it. Just be absolutely sure that it’s not your main windows installation otherwise it’ll be painful.
thanks,i just switched back to linux and did it from there. personally using proprietary software to make proprietary software more usable sound like the plot of a horror movie.
and yes this is another drive with a different windows folder im not trying to break the system.
It’s the same for Linux though, if you mount any drive, your user or rather UID/GID needs appropriate permissions to perform any action. Can even happen that you mount a disk with your old home directory somewhere and can’t access it because your UID changed between installations (though it’s 1000 for most people).
hmm i just tested it i can nuke any folder under / no extra work required.
You can nuke a linux-permission-controlled folder from an account that does not have that permission? How did you misconfigure your linux to allow that?!
didnt configure anything i booted a live iso and it worked
Aaah, I get it.
Yeah of course that works. If you disable the entire permission framework, naturally permissions can no longer stop you (this is where something like Bitlocker would step in so that even if someone takes the physical drive out they cannot just read from it).
But importantly the same would of course work the other way around. Linux permissions mean fuck all if there’s no Linux around to enforce them, you can just delete whatever then.
but thats the thing that confuses me, what is the point of these permissions if you can just go around them with another os? this is just a limitation for windows itself, i dont get it
Well how else would that work? You need a piece of software to enforce the permissions. Once that Software is gone, nothing exists to stop you.
but then dont call it a security thing, its just an annoyance. you encrypt your data if you dont want others to read it.
You’re a sysadmin, you’ll figure it out one day. But here’s a clue : why would you need to protect a windows folder from being written into by windows-based malwares from a linux OS ?
Don’t worry, you don’t need to try in order to break Windows
who the hell is this TrustedInstaller dude anyway???
And why is he trusted? I sure as fuck don’t trust him
You can use a tool called “winaero tweaker” and there enable an option called “take ownership” then when you right click the folder, you can take ownership of it and do whatever you want with it. Just be absolutely sure that it’s not your main windows installation otherwise it’ll be painful.
thanks,i just switched back to linux and did it from there. personally using proprietary software to make proprietary software more usable sound like the plot of a horror movie.