• Re: WindowsApps folder

    From Paul@3:633/280.2 to All on Wed Sep 3 01:43:32 2025
    On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:
    When I try to get permission to view it with "Advanced Security Settings for WindowsApps"
    it gives me "This access control entry is corrupt.Delete it and create a new one".
    Before I even try to delete it, I'm wondering if it would be safe to even try.
    Everything seems to be working, and the folder passes all AV scans.
    I've run Dism and Sfc as well; all ok.
    And yes, I have googled; including this; https://learn.microsoft.com/en-us/answers/questions/2728849/access-control-entry-is-corrupt

    Expert experience and help is welcome.

    Ed

    It depends what you want to do in there. Most of the time, I just like to note the contents,
    and a read-only method is all I want.

    [Picture]

    https://i.postimg.cc/1X7MLtSv/access-restrictions.gif

    What the picture shows, is me making a Macrium Reflect backup of C: ,
    using the Macrium Mounter to mount the backup image as the letter K: ,
    and me ticking the nice box that "removes access restrictions". Later,
    you can right-click K: and use Macrium again to dismount the MRIMG file.

    I can traverse K: and look in the folders in there. Activity with
    respect to the MRIMG is read-only, so pretending to delete things
    from K: is not having an effect on the contents of the MRIMG file.

    From Linux, you can have some amount of fun in C: too.
    But the access is not without surprises (I/O Error which is a
    fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver.
    And you can select which driver to use, for doing a mount of a
    partition such as C: .

    "Permissions" are not the only protection feature in Windows. An example
    of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
    you probably know the details of that one (for protecting Program Files
    content from modification). You can impersonate TrustedInstaller. On
    occasion, the programs that do the impersonation for you, are
    "busted" on Windows, and maybe a couple months later, they are
    working again. It is hard to say what-all is accounting for this
    (the behind the scenes jibber-jabber).

    Paul

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Alan K.@3:633/280.2 to All on Wed Sep 3 03:52:54 2025
    On 9/2/25 11:43 AM, Paul wrote:
    On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:
    When I try to get permission to view it with "Advanced Security Settings for WindowsApps"
    it gives me "This access control entry is corrupt.Delete it and create a new one".
    Before I even try to delete it, I'm wondering if it would be safe to even try.
    Everything seems to be working, and the folder passes all AV scans.
    I've run Dism and Sfc as well; all ok.
    And yes, I have googled; including this;
    https://learn.microsoft.com/en-us/answers/questions/2728849/access-control-entry-is-corrupt

    Expert experience and help is welcome.

    Ed

    It depends what you want to do in there. Most of the time, I just like to note the contents,
    and a read-only method is all I want.

    [Picture]

    https://i.postimg.cc/1X7MLtSv/access-restrictions.gif

    What the picture shows, is me making a Macrium Reflect backup of C: ,
    using the Macrium Mounter to mount the backup image as the letter K: ,
    and me ticking the nice box that "removes access restrictions". Later,
    you can right-click K: and use Macrium again to dismount the MRIMG file.

    I can traverse K: and look in the folders in there. Activity with
    respect to the MRIMG is read-only, so pretending to delete things
    from K: is not having an effect on the contents of the MRIMG file.

    From Linux, you can have some amount of fun in C: too.
    But the access is not without surprises (I/O Error which is a
    fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver.
    And you can select which driver to use, for doing a mount of a
    partition such as C: .

    "Permissions" are not the only protection feature in Windows. An example
    of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
    you probably know the details of that one (for protecting Program Files content from modification). You can impersonate TrustedInstaller. On occasion, the programs that do the impersonation for you, are
    "busted" on Windows, and maybe a couple months later, they are
    working again. It is hard to say what-all is accounting for this
    (the behind the scenes jibber-jabber).

    Paul
    I can't get to your image. Secure connection failed.

    --
    Linux Mint 22.1, Thunderbird 128.14.0esr, Mozilla Firefox 142.0
    Alan K.

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From sticks@3:633/280.2 to All on Wed Sep 3 04:42:17 2025
    On 9/2/2025 12:52 PM, Alan K. wrote:
    On 9/2/25 11:43 AM, Paul wrote:
    On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:
    When I try to get permission to view it with "Advanced Security
    Settings for WindowsApps"
    it gives me "This access control entry is corrupt.Delete it and
    create a new one".
    Before I even try to delete it, I'm wondering if it would be safe to
    even try.
    Everything seems to be working, and the folder passes all AV scans.
    I've run Dism and Sfc as well; all ok.
    And yes, I have googled; including this;
    https://learn.microsoft.com/en-us/answers/questions/2728849/access-
    control-entry-is-corrupt

    Expert experience and help is welcome.

    Ed

    It depends what you want to do in there. Most of the time, I just like
    to note the contents,
    and a read-only method is all I want.

    ˙˙˙ [Picture]

    ˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif

    What the picture shows, is me making a Macrium Reflect backup of C: ,
    using the Macrium Mounter to mount the backup image as the letter K: ,
    and me ticking the nice box that "removes access restrictions". Later,
    you can right-click K: and use Macrium again to dismount the MRIMG file.

    I can traverse K: and look in the folders in there. Activity with
    respect to the MRIMG is read-only, so pretending to delete things
    from K: is not having an effect on the contents of the MRIMG file.

    ˙From Linux, you can have some amount of fun in C: too.
    But the access is not without surprises (I/O Error which is a
    fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver.
    And you can select which driver to use, for doing a mount of a
    partition such as C: .

    "Permissions" are not the only protection feature in Windows. An example
    of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
    you probably know the details of that one (for protecting Program Files
    content from modification). You can impersonate TrustedInstaller. On
    occasion, the programs that do the impersonation for you, are
    "busted" on Windows, and maybe a couple months later, they are
    working again. It is hard to say what-all is accounting for this
    (the behind the scenes jibber-jabber).

    ˙˙˙ Paul
    I can't get to your image.˙˙ Secure connection failed.


    No problem here


    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Alan K.@3:633/280.2 to All on Wed Sep 3 08:00:40 2025
    On 9/2/25 2:42 PM, sticks wrote:
    On 9/2/2025 12:52 PM, Alan K. wrote:
    On 9/2/25 11:43 AM, Paul wrote:
    On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:
    When I try to get permission to view it with "Advanced Security
    Settings for WindowsApps"
    it gives me "This access control entry is corrupt.Delete it and
    create a new one".
    Before I even try to delete it, I'm wondering if it would be safe to
    even try.
    Everything seems to be working, and the folder passes all AV scans.
    I've run Dism and Sfc as well; all ok.
    And yes, I have googled; including this;
    https://learn.microsoft.com/en-us/answers/questions/2728849/access-
    control-entry-is-corrupt

    Expert experience and help is welcome.

    Ed

    It depends what you want to do in there. Most of the time, I just like
    to note the contents,
    and a read-only method is all I want.

    ˙˙˙ [Picture]

    ˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif

    What the picture shows, is me making a Macrium Reflect backup of C: ,
    using the Macrium Mounter to mount the backup image as the letter K: ,
    and me ticking the nice box that "removes access restrictions". Later,
    you can right-click K: and use Macrium again to dismount the MRIMG file. >>>
    I can traverse K: and look in the folders in there. Activity with
    respect to the MRIMG is read-only, so pretending to delete things
    from K: is not having an effect on the contents of the MRIMG file.

    ˙From Linux, you can have some amount of fun in C: too.
    But the access is not without surprises (I/O Error which is a
    fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver. >>> And you can select which driver to use, for doing a mount of a
    partition such as C: .

    "Permissions" are not the only protection feature in Windows. An example >>> of one of these is MIC (Mandatory Integrity Control). TrustedInstaller,
    you probably know the details of that one (for protecting Program Files
    content from modification). You can impersonate TrustedInstaller. On
    occasion, the programs that do the impersonation for you, are
    "busted" on Windows, and maybe a couple months later, they are
    working again. It is hard to say what-all is accounting for this
    (the behind the scenes jibber-jabber).

    ˙˙˙ Paul
    I can't get to your image.˙˙ Secure connection failed.


    No problem here

    Working now.

    --
    Linux Mint 22.1, Thunderbird 128.14.0esr, Mozilla Firefox 142.0
    Alan K.

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Paul@3:633/280.2 to All on Wed Sep 3 17:04:44 2025
    On Tue, 9/2/2025 6:00 PM, Alan K. wrote:
    On 9/2/25 2:42 PM, sticks wrote:
    On 9/2/2025 12:52 PM, Alan K. wrote:
    On 9/2/25 11:43 AM, Paul wrote:
    On Tue, 9/2/2025 7:58 AM, Ed Cryer wrote:
    When I try to get permission to view it with "Advanced Security
    Settings for WindowsApps"
    it gives me "This access control entry is corrupt.Delete it and
    create a new one".
    Before I even try to delete it, I'm wondering if it would be safe to >>>>> even try.
    Everything seems to be working, and the folder passes all AV scans.
    I've run Dism and Sfc as well; all ok.
    And yes, I have googled; including this;
    https://learn.microsoft.com/en-us/answers/questions/2728849/access-
    control-entry-is-corrupt

    Expert experience and help is welcome.

    Ed

    It depends what you want to do in there. Most of the time, I just like >>>> to note the contents,
    and a read-only method is all I want.

    ˙˙˙˙ [Picture]

    ˙˙˙˙˙ https://i.postimg.cc/1X7MLtSv/access-restrictions.gif

    What the picture shows, is me making a Macrium Reflect backup of C: ,
    using the Macrium Mounter to mount the backup image as the letter K: , >>>> and me ticking the nice box that "removes access restrictions". Later, >>>> you can right-click K: and use Macrium again to dismount the MRIMG file. >>>>
    I can traverse K: and look in the folders in there. Activity with
    respect to the MRIMG is read-only, so pretending to delete things
    from K: is not having an effect on the contents of the MRIMG file.

    ˙˙From Linux, you can have some amount of fun in C: too.
    But the access is not without surprises (I/O Error which is a
    fake I/O error). Linux now has two NTFS drivers, one is the FUSE driver. >>>> And you can select which driver to use, for doing a mount of a
    partition such as C: .

    "Permissions" are not the only protection feature in Windows. An example >>>> of one of these is MIC (Mandatory Integrity Control). TrustedInstaller, >>>> you probably know the details of that one (for protecting Program Files >>>> content from modification). You can impersonate TrustedInstaller. On
    occasion, the programs that do the impersonation for you, are
    "busted" on Windows, and maybe a couple months later, they are
    working again. It is hard to say what-all is accounting for this
    (the behind the scenes jibber-jabber).

    ˙˙˙˙ Paul
    I can't get to your image.˙˙ Secure connection failed.


    No problem here

    Working now.


    That server takes quite a beating.
    Sometimes there is a 500: Gateway issue, as
    an example of a failure that can last half a day.

    https://postimages.org/

    But, it doesn't require registration, and that's the way I like it.

    If you try to upload this image to the server, you get smacked.
    It has automatic filtering for content.

    https://sorcerers-apprentice.fandom.com/wiki/Sorcerer_Mickey

    Paul

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)