• Reddfugee42@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    3 months ago

    The real answer?

    “We once gave you commoners this power and you used it to fuck your computer up and then blamed us for it, so we learned you can’t be trusted with this power. We hid it behind a kind of skill test, and you’re failing that test.”

    • Adalast@lemmy.world
      link
      fedilink
      arrow-up
      0
      arrow-down
      1
      ·
      3 months ago

      I prefer the answer of giving the giy the reins and letting him get it so riddled with viruses then when he calls for support replying “sorry, your property your problem. You have absolute dominion over it and thus we give no warranty as we have no responsibility.”

  • John Richard@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    Andrew is not very smart. Windows isn’t very good, but he is very clueless. There are legitimate things to complain about, but Andrew just complains.

    • miridius@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Eh? On Linux you also aren’t supposed to log in as root, and you also have to individually set file permissions.

      This issue is unrelated to windows, it’s a safety feature that all modern desktop OSes have

      • Lemzlez@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 months ago

        It’s quite common to login as admin on windows though (in home setups), you’ll still have to authenticate for administrative tasks (the UAC popups).

        The issue here is mostly that the user has probably upgraded and windows changed their account, resulting in the files being owned by their old account.

        In linux, that’s fixable with ‘sudo chmod -R’

        In Windows, there’s no built-in way, you need the take ownership script.

      • laughterlaughter@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        3 months ago

        Yes, but on Linux, if I am root, I am God. I do whatever the fuck I want with my machine, for good, evil or stupidity. That’s the poster’s point. It seems like Windows doesn’t allow you to do this, or at least not easily. So I guess people who want to have absolute control over their computer shouldn’t be using Windows, I guess.

        • miridius@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          2 months ago

          I think windows is a pretty good middle ground. Yes it’s annoying that you might need to install a 3rd party tool to give you a right click menu option to take ownership of any file/folder, but at least you can do that and it’s easy. And for normies that don’t have Linux-fu they’ll get into a lot less trouble than if you give them Linux.

          MacOS on the other hand, if there’s something Apple decided users are too dumb to be allowed to do (which it turns out, is a lot of stuff), then you just can’t do it, period.

  • intensely_human@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    Is this real? Are people having to request permission changes on files by petitioning microsoft to change their permissions?

    • homura1650@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      I think what happened here is that something went wrong and messed up the permissions of some of the users files. MS help suggested that he login as an administrator and reatore the intended permissions.

      I don’t work with Windows boxes, but see a similar situation come up often enough on Linux boxes. Typically, the cause is that the user elevated to root (e.g. the administrator account) and did something that probably should have been done from their normal account. Now, root owns some user files and things are a big mess until you go back to root and restore the permissions.

      It use to be that this type of thing was not an issue on single user machines, because the one user had full privileges. The industry has since settled on a model of a single user nachine where the user typically has limited privileges, but can elevate when needed. This protects against a lot of ways a user can accidentally destroy their system.

      Having said that, my understanding of Windows is that in a typical single user setup, you can elevate a single program to admin privileges by right clicking and selecting “run as administrator”, so the advice to login as an administrator may not have been nessasary.

      • intensely_human@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        So this guy is just bitching because he sudo installed something?

        It’s not MS having to manage your folder permissions remotely?

        • psud@aussie.zone
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          3 months ago

          I feel like he has a machine that someone set up for him, and he can’t escalate permissions, because he’s on a basic user account.

          The normal way this works on a single user machine is:

          1. You try to do something that is restricted to admin
          2. Windows puts up a modal dialogue box asking if you want to do it as admin
          3. You click yes
          4. You do it as admin

          But in that case he can’t have locked himself out of a file, he can only be locked out of things Microsoft think you shouldn’t muck with unless you know what you’re doing

  • KomfortablesKissen@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    I want to say “Haha, Idiot trusting Microsoft”.

    But honestly I want the same stuff he wants. Including modems in mobile phones. Including EVERYTHING I own.

    • drathvedro@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      There’s an OS you might like. It has no UAC, no file permissions, no sudo nor chmod, as it has no multi-user support, no antivirus and no firewall, no protection rings, not even spectre/meltdown mitigations, and most of all - no guard-rails whatsoever: You can patch the kernel directly at runtime and it won’t even give you a warn. And yet, it is perfectly safe to run. It’s called TempleOS and it achieves such a flawless security by having no networking support whatsoever and barely any support for removable media. If you want a piece a software - you just code it in, manually. You don’t have to check the code for backdoors if it’s entirely written by you… only for CIA at your actual back door…

  • onlooker@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    3 months ago

    Andrew is ignorant. He could learn the basics of computer literacy, which would answer all his questions, but I’ll take a shot in the dark and say that Andrew doesn’t want to do that and is perfectly happy being ignorant. And also angry.