?
Solved

Messed up file security permissions keeping system from running win2k

Posted on 2001-08-31
3
Medium Priority
?
128 Views
Last Modified: 2012-05-04
After an error in changing our file security permissions from the root (our bad) on our Win2k server we are now getting the following message upon boot:

autochk cannot be found.  skipping autochk

Is there a way to change permissions in Win2k like there is in NT 4.0 using the CACLS command?  IF there isn't, what is the best way to go about correcting messed up file permissions?

Thanks for the help.
0
Comment
Question by:aarik
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Accepted Solution

by:
geoffryn earned 300 total points
ID: 6446402
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6447177
0
 

Author Comment

by:aarik
ID: 6483657
Thanks sorry it took so long.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance and…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question