-
What you say can't be done, as long as it can be read, it can be copied. Because both read and copy belong to read permissions.
-
Import on a new server. (can be from Windows 2000 to Windows 2003).
CACLS displays or modifies the access control list (ACL) of a file
cacls filename [/t] [/e] [/c] [/g user:perm] [/r user [.
p user:perm [./d user [.
filename shows ACL.
t changes the current directory and all its subdirectories.
Specifies the ACL of the file.
e acl without replacement.
c Continue in the event of an access denied error.
g user: perm to grant access to the specified user.
perm can be: r read.
w write. c Change (Write).
f Full control.
r user revokes access to a specified user (only legally when used with e).
p user: perm to replace the specified user's access rights.
The perm can be: n None.
r read. w write.
c Change (Write).
f Full control.
d user denies access to the specified user.
You can use wildcards to specify multiple files in a command.
You can also specify multiple users in a command.
Abbreviation: CI - Container Inheritance.
ace is inherited by the directory.
OI - Object inheritance.
The ace is inherited by the file.
io - Inherit only.
ACE does not apply to the current file directory.
Run it in the root directory you want to export. For example: c: cacls *
-
With Nut Cloud, users can easily achieve file backup, sharing and mobile access, and use the team management function of the team version to achieve convenient and efficient collaborative office.
-
cacls
Displays or modifies the access control list (ACL) of a file
cacls filename [/t] [/e] [/c] [/g user:perm] [/r user [.
p user:perm [./d user [.
filename shows ACL.
t Change the ACL of the specified file in the current directory and all of its subdirectories.
e acl without replacement.
c Continue in the event of an access denied error.
g user: perm to grant access to the specified user.
perm can be: r read.
w write. c Change (Write).
f Full control.
r user revokes access to a specified user (only legally when used with e).
p user: perm to replace the specified user's access rights.
The perm can be: n None.
r read. w write.
c Change (Write).
f Full control.
d user denies access to the specified user.
You can use wildcards to specify multiple files in a command.
You can also specify multiple users in a command.
Abbreviation: CI - Container Inheritance.
ace is inherited by the directory.
OI - Object inheritance.
The ace is inherited by the file.
io - Inherit only.
ACE does not apply to the current file directory.
Run it in the root directory you want to export. For example: c: cacls *
-
Permcopy is OK I've been using this all the time, first you need to turn on sharing permissions in another folder.
-
If you don't know about servers, you can copy the problem to a category like network engineering or servers.
-
Use attrib -h -s -r to remove the system read-only attributes, and then use xcopy.
-
Windows File Share Server Management Defects:
1. Shared files are easy to delete: once the shared files are deleted, they are permanently deleted, and the Windows system does not have a network website;
2. Few permissions for sharing files: only read-only, modify, and full permissions, and can only be assigned to folders;
3. There is no hierarchy of permission allocation: the subordinate directories of the shared folder can only inherit the higher-level permissions, and cannot allocate permissions in a fine-grained manner;
4. Low efficiency of authority allocation: when there are many users, the allocation takes a lot of time, and it is not possible to assign authority to multiple people and delegate departments;
5. No log of file operation: There is no log of user operation of the shared folder client, and it is difficult to trace the problem;
6. No backup for file sharing: Windows file server has no backup function, and it cannot recover disasters once it is infected or deleted;
Solution: There is a software system that optimizes the management of Windows shared file servers. On the basis of Windows simple sharing (enterprises do not need to build complex domain sharing, FTP, NAS systems), the Windows file sharing permission function is transformed, from the original can only support the single-layer folder permission assignment function, can support multi-level folders and a single file fine-grained, multi-level permission assignment function, permission types can support visible, read-only, modify, rename, delete and other permissions, and the permission assignment console can be used by multiple administrators to assign permissions at the same time. The authority can be delegated to the department administrator, which greatly liberates the workload of IT network management personnel for enterprise shared file management, and at the same time increases the network station function and document operation log recording function, so you don't have to worry about the shared file being deleted, which is well documented.
-
If the drive is in NTFS format, you can use the disk management permission to achieve it, click right click - Permissions to give each user relevant permissions as needed.
-
There are two permissions to set, one is the sharing permission and the other is the security permission. You may only set security permissions, but not sharing permissions, which are read-only by default.
-
You only need to set it in the sub-file properties - security, and put it in security.
Tick off. Then add the people you need to access.
-
It's weird.,The deletion permission should be higher than the modification permission.,That is, if you can delete it, you can basically change it.。
It is possible that another user is modifying the file, and the file is being used by other users, that is, it is being opened.
In addition, the permissions of a shared folder are divided into two parts, the shared permissions and the permissions of the folder itself, and the permissions that are finally executed are the valid permissions that are combined. The selection of effective permissions is related to the relationship, that is, the permissions given by both sides are valid.
You give full control over the sharing permissions, maybe the permissions you give are not complete, check it again.
-
If the same file is opened by multiple people, it may be like this.,But most of it is still a matter of permission.,See if the permissions are not set in the right-click security of the shared folder.,Some folders not only have sharing permissions.,There are also security permissions under the NTFS format.,Try it.。
-
The reason for the problem is that this file is opened. If there is only one user on the file at this point, there will be no save occurrence.
Hope it solves your problem. Don't forget to give me extra points!
-
I also want to ask, how to deal with it later.
-
Same question, same problem.
-
It's impossible to do. Open is the right to read, and copy is also the right to read. Same permission. The steps to set permissions for shared folders are as follows:
1. On the computer file you want to share, right-click to share and secure.
2. Open the security tab and add the permission to share users.
3. Select permissions for the sharing user. Are you sure.
4. The sharing setting is successful.
-
That's right, I chose"Read-only"When someone else accesses a shared file, it can only be opened, but no other operations can be done.
-
Right-click on the file you need to set up this feature on'Read-only'
-
Click on your folder properties to have an option under the username of everyone in security, and you can see for yourself.
You don't need me to teach you.
It's best to remove all the ticks.
1.Turn on guest. Right-click on "My Computer" --Manage --Local Users & Groups --Users, find guest on the right and enable it. >>>More
It is recommended that you use the Stealth Privacy Encryption Tool. It is a privacy encryption tool, which can encrypt storage information such as USB flash drives, computer hard disks, mobile hard disks, etc., with no plug-ins in green. Easy to use and high safety factor. >>>More
It is recommended to use Yitong folder lock software, which supports all Windows systems. It can encrypt folders, encrypt files, and encrypt disks, which is safe and easy to use. After installing the software, right-click the folder you want to encrypt and select Yitong Folder Encryption in the right-click menu to encrypt the software.
You can't lock it directly with your computer. I used the folder encryption super master, free 30 times, and the function is quite good.
Can you tell me what folder you deleted.
If it's a system folder, of course you can't delete it. You have to really look at him unpleasantly, and format it directly. >>>More