?
Solved

Taking Ownership

Posted on 2005-04-16
3
Medium Priority
?
421 Views
Last Modified: 2010-04-11
I have had to take ownership of a file.  I can't however open any of the documents inside the file after taking ownership.  I need to know how I can look at these documents and put them onto a disk.
0
Comment
Question by:abolla
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
rossfingal earned 2000 total points
ID: 13797901
To take ownership of a folder, follow these steps:
Right-click the folder that you want to take ownership of -
and then click Properties.
Click the Security tab -
and then click OK on the Security message (if one appears).
Click Advanced, and then click the Owner tab.
In the Name list, click your user name, or click Administrator if you are logged in as Administrator -
or click the Administrators group.
 
If you want to take ownership of the contents of that folder -
select the "Replace owner on subcontainers and objects" check box.
Click OK, and then click Yes when you receive the following message:

"You do not have permission to read the contents of directory (folder name).
Do you want to replace the directory permissions with permissions granting you Full Control?"

All permissions will be replaced if you press Yes.

(Note folder name is the name of the folder that you want to take ownership of.)

Click OK, and then reapply the permisions and
security settings that you want for the folder and its contents.

RF
0
 
LVL 1

Author Comment

by:abolla
ID: 13806248
Thank you!
0
 
LVL 12

Expert Comment

by:rossfingal
ID: 13807162
Hi!

Glad someone here could help!

Thanks and good luck!
RF
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question