When performing certain actions from the operating system, a notification may come that it is necessary to gain access to perform the task in the form of a system message "you need permission to perform this operation." It is worth considering separately if the request was made from a simple user, and separately - by the computer administrator. But how does it happen that an administrator needs to get access, if he is already the most important?
What is file access?
In order to be able to somehow influence a specific file, you must first access. As a rule, access is established simultaneously with logging in as a user with certain rights. But there may be exceptions when access to a file or a group of files was deliberately limited with the help of additional software. In fact, access to a file means the ability to perform certain manipulations. If the computer says that you need permission to perform an operation to start it, it means that for some reason you were limited in use. And if you tried to run something that you have no idea about and see for the first time, most likely this is a program file, and you do not need to touch it.
Why is it installed?
The fact is that there is a fairly significant number of malicious files, as well as files that are important for the full functioning of the operating system. And so that the user does not accidentally disable the electronics, and the restriction applies. There are a lot of opportunities to harm, this is how to install programs downloaded from the Internet, and to change or even delete files important to the system. So, when you try to edit system files, you will see the message "you need permission to perform this operation." System32, Windows or Program Files (in some cases) are those folders when you tried to run files in which you could see such a message. And believe me, here protection is not in vain, if not for it,how many people would additionally be forced to contact repair services or electronics stores to purchase new personal computers.Different types of users in operating systems
Before speaking, there are 3 main types of users that modern standard universal personal computers work with: administrators, ordinary users, and guests. The difference between them is this:
- . . , . . , . , «» . – , , , , , . , « , Windows 7 » - .
- Ordinary users. They support the creation of additional files within individual programs, but they cannot be used to install and remove programs themselves. An example is the availability of office software and the creation of separate files to fit your needs.
- Guests. Limited users who basically have very few rights (but they can be expanded or even cut back). The category is used to provide access to people who need a computer for a while or for a narrow range of activities.
How to get access?
The easiest option is to change the user type. Some programs require running with administrator privileges. In such cases, you need to log in with the appropriate tool, right-click on the icon and select "Run as administrator".. , , . , , . , , .
? ! , , , . , «» « ». . – , .
A little more detailed should dwell on the restrictions regarding the launch of programs. The fact is that some programs require access to the program register of the computer or may have potentially unsafe components. In the case of the first option, in order to avoid clogging the registers and, accordingly, the speed of the computer, a similar restriction is introduced. Also, the message “you need permission to perform this operation” can serve as an indicator of the importance of the program and its actions, which is why the control of an experienced person is required (which by default is considered the administrator). The second option is possible in cases where everything is done to avoid the possibility of the user installing software of suspicious content, which includes everything downloaded from the Internet.Restriction to delete
Now regarding the messages “you need permission to perform this operation on deletion”. Why was this mechanism installed? This is done to prevent the removal of programs recorded on the computer. Only user with administrator rights can completely remove software components. Just moving to the basket and cleaning it is no guarantee that the object is no longer there. With the help of special software tools, deleted information can be restored (here, however, there are a number of nuances, but this is a topic for a separate article).Conclusion
So, the article examined what to do when there is no access to certain files, what could be the reason for this. Next, you should direct your efforts in a certain direction and do everything necessary.