New
#11
.
.
Results:
C:\WINDOWS\system32>net user
User accounts for \\DESKTOP-P52R3T1
-------------------------------------------------------------------------------
Administrator <me> <me2>
DefaultAccount Guest <a guest>
TestColours WDAGUtilityAccount
The command completed successfully.
.
Thanks
.
.
Last edited by OldGrantonian; 18 May 2023 at 13:56.
Which was the account that used to appear on your login screen but no longer does?
For that AccountName, run
Net user AccountName
and check the line in the response
Account active
as I suspect it is now disabled so would report
Account active - No.
It is unusual to use Guest accounts these days. I assume <a guest> was just your way of saying Somebody else rather than it actually being a Guest-type account. This should be clear in the
Net user AccountName
response in the line
Local Group Memberships
All the best,
Denis
@Ghot said:
.
---------------------------
As for C:\Program Files\WindowsApps, I believe Windows itself blocks access to that folder.
I had to use "Take Ownership" to access that folder...
--------------------------
.
I also would need to use "Take Ownership".
However, I wasn't referring to:
C:\Program Files\WindowsApps
I was referring to:
C:\Users\<me>\AppData
Thanks
Your Appdata folder should, by default, be owned by you and you should have Full control over it.
This is all getting very messy.
Do you have a system image from before all this hassle started?
You could copy all your own files to an external backup drive, restore that old system image and then copy all your own files back.
[I always make a system image of the current state before repairing things or restoring old system images. That way, I can be confident that the very worst that can happen is that I end up back where I am now.]
Denis
@Try3 said:
.
--------------------
Which was the account that used to appear on your login screen but no longer does?
For that AccountName, run
Net user AccountName
and check the line in the response
Account active
as I suspect it is now disabled so would report
Account active - No.
--------------------
.
My laptop has already been restored to a pre-BitDefender Macrium. So, your question has been overtaken by events. But thanks anyway.
Before the Macrium restore, I tried the entire suite of possible "Net user" variations. None of these showed the account name "SecondAdmin" (or similar).
Thanks
.
"None of these showed the account name "SecondAdmin" (or similar)."
If it wasn't reported by the bare
command then it no longer existed.Code:net user
It would still have been reported even if it was disabled or corrupted.
Denis
@Ghot said:
.
---------------------------
Sorry, my bad. You can just do Take Ownership for that folder as well.
--------------------------
.
After the Macrium restore, I no longer need to do that. All the Admin rights that I had before BitDefender have been restored.
I can see everything on my laptop. That includes everything in AppData. (I have Level 2 UAC set.)
Long before iDrive was invented by Al Gore, I was using scripts such as the following to back up AppData files.
---------------------
REM This bat copies files from sd to dd
@Echo Off
Set "sd=C:\Users\<me>\AppData\Roaming\CintaNotes\backup"
Set "dd=D:\1SoftwareRelated\Backups\CintaNotes"
Set "ds="
If Not Exist "%sd%" Exit /B
For /F "Tokens=1-3Delims=/ " %%A In ('RoboCopy/NJH /L "\|" Null'
) Do If Not Defined ds Set "ds=%%A_%%B_%%C"
If Not Defined ds Exit /B
RoboCopy "%sd%" "%dd%\%ds%" /E
Pause
--------------------
That BAT file is dated 2017.
I have a sneaking suspicion that some of the folks in this thread might not be allowed to run that file.
Thanks
Since, like so many of us, you are using an Admin account as your day-to-day user account, I believe that it is worth raising UAC to its highest level.
I reviewed lots of malware a few years ago that claimed to be able to elevate itself to run as Admin and hence be more invasive. None of it was able to do so if UAC was at its highest setting. I've kept UAC at its highest ever since.
All the best,
Denis