How do you keep users from creating directories deeper than 260 characters of the root of the drive?

In Windows, it seems impossible to create/join the files with a path longer than 260 characters.

Well, not completely: you can create these files if you create a shortcut or point a reader shared inside the path, but that's exactly how this problem gets so bad: a user creates a share X: pointing to \\myserver\longdirname\evenlongerdirname\verylongdirname\etc\verylongfilename

then it creates a file in X:\evenlongerdirnamethanYouHaveEverSeen\SuperLongDirNameJustLongEnoughToBe260FromTheRoot

Note: the names of directories must be long, you can also create a shorter longer string of names of directories (a\b\c\d\e\f\g...)

now, someone trying to open this file of \\myserver fail miserable. In fact, windows behaves a bit ridiculous and sometimes silently ignores files. I've seen this happen when people copy a folder of installation deep inside a fileshare: the installation program is a DVD or CD and a subscription contains 1000 directories, some are more than 260 tank when opened from the root. Then you get really weird behaviour: files ignored!

As 260 characters was probably very well when the disks were<10GB but="" if="" you="" have="" 1="" tb="" drive,="" it's="" not="" too="" hard="" to="" end="" up="" with="" directories="" that="" are="" way="" deeper="" than="" 260="" characters.="" so="" i="" predict="" that="" there="" will="" be="" a="" time="" soon="" where="" ntfs="" needs="" to="" be="" adapted="" to="" be="" able="" to="" use="" large="" disks="" decently.="" this="" is="" also="" made="" worse="" because="" people="" create="" files="" with="" really="" bad="" names="" (e.g.="" a="" outlook="" msg="" files="" will="" be="" called="" the="" same="" as="" its="" subject="" line,="" fun="">

Don't tell people don't do that, I see it in my everyday environment, and it breaks a lot of programs (and then the bad programmer is blamed for drawback of Windows: "you can't even open a file named a.txt")

Question: How do you keep the users to create a file that is > 260 characters if we take into account the root of the drive, rather than a part under?

Hi PM3.141592
 
Your question of Windows is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public.
 

Please ask your question in the Forums Pro Windows XP IT.

Tags: Windows

Similar Questions

  • How can you ask a question that requires more than one sentence (although the limitation of the device seems to be characters)?

    Well, that answers the question above. Now for the real question. I need to regain my search bar of alternative search engines, and I don't want to start typing a search to get them (bad idea). I found the suggestion below but have no idea how "middle click" or how to get to the page mentioned "config". Can anyone help?

    If you want to restore the window previously used independently to manage search engines, you can enable or disable this pref to false with a medium on the subject click: config page.

       about:config page: browser.search.showOneOffButtons = false
    

    You will need to close and restart Firefox to make it work properly.

    You can open the topic: config page via the address bar. You can accept the warning and click on "I'll be careful" to continue.

       http://kb.mozillazine.org/about:config
    

    Type Subject: config in the address bar (address) and press the enter key to open the topic: config as you open a Web site by typing the URL in the address bar of the page.

    • If you see a warning message, so you can confirm that you want to access the comments: config page.

    You can use the search bar on top of the on: page config to identify preferences more easily and in this case you can type from time to time until you see the browser.search.showOneOffButtons preference.
    Preferences that have been changed and do not have the default display in bold (the user's game).
    You can toggle this Boolean False pref with a double click on the line with the pref or use edit on the shortcut menu.

  • How do you keep users to connect via the desktop remotely on another?

    Use: Windows 2008 R2
    Connection method: connection Remote Desktop

    We have users insist on granting of their login and password to another user if that person can connect. Even when they have their own login!

    So what happens is the the two #1 can be saved in on the job server all log in user #2 in the server, with the same login, closing at #1. While I can only educate them to use their own connections, so the saying goes, you can lead a horse to water, but you cannot make them drink. :(

    What I have and I'm not finding, is a way to have the system notify User #2 that login is already in use, try again later.  I would like to accomplish this through Group Policy.

    Thanks in advance for any help!

    Jack W.

    Hello

    The question you posted would be better suited in the TechNet Forums. I would recommend posting your query in the TechNet Forums:

    http://social.technet.Microsoft.com/forums/en-us/category/WindowsServer

  • I did everything suggested. How do you keep it from 'not repsonding?

    In the last six weeks, that I had to reinstall FireFox and follow all your suggestions, including Flash Player, who soon not to go haywire and needs to be redone as well. That is what it is? This was not happening.

    It is possible that your security (firewall, antivirus) software blocks or limit Firefox or the process of plugin-container without you inform, possibly after the detection of changes (update) for the Firefox program.

    Delete all rules for Firefox and the plugin-container in the permissions list in the firewall and leave your firewall again ask permission to get full unlimited access to the internet for Firefox and the plugin-container and the update process.

    See:

    Start the computer in safe mode Windows with network support (on the startup screen, press F8) as a test to see if that helps.

  • How to prevent the user from creating jobs

    Hello

    We need to prevent the user from creating jobs on a dev environment. It's a 10.2.0.4 standard database on 64-bit linux.

    Their scheme has only connect and resource roles. Is it possible to prevent them from creating jobs? 11 g, it's permission to CREATE a TASK, but I don't know how I can do this in 10g.

    Thanks for all the ideas!

    I try again...

    If you revoke execute privilege on DBMS_JOB package with 'regular' users (i.e. non admin), then they will not be able to do anything, including by creating with the SUBMISSION process.

    No you want?

  • How do you keep a message from Inbox disappear on your laptop after you read that on the desk?

    Original title: messages received

    How do you keep a message miscare disappear at the top of a tower, after you read the desktop

    You must leave a copy of messages on the server on both machines so that both can access the messages.  Generally, a machine will delete messages after they are downloaded.  You can prevent this, but we need to know what e-mail program, you use to be able to tell you were the parameters is.  In OE and WinMail in Vista, you define which under Tools | Accounts | Mail | Properties | Advanced, but it will be in a different place for different programs.

    Steve

  • How do detect you if a person spying on your computer. How do you keep it

    I have 2 pc. You can detect if 2 pc spy remotely on pc1. If so how do you keep it

    Hi Traci,

    I can't provide technical and tactical spy, hacking methods, or how to use malware to infect a computer with programs or also in a forum dedicated to protection against such things - I don't know if it would be a violatiion of the forum (more likely) COC, but it would be a violation of my ethical principles.  There are countless methods.  I will go this far just to give you an idea (and this is more or less a "sanctioned" method used by employers and parents to monitor the activity of employees or children and not the most sophisticated hacking methods)- and I'm not recommending or suggesting this program (I almost never recommend paid software when I can usually find free options that work almost as well and I don't know anything about and) just a quick did search to find one to use as an example), but just use it as an example of what can be installed, see: http://spysoftware.com/spyagent.html which is even more powerful with a direct administrative access to your computer.

    If someone has administrative access to your computer, then it is extraordinarily difficult for anyone to detect it or prevent espionage (if done correctly).  I don't know yet I could do (detect-not necessarily in place - according to the way it was done - well well, I might be able to do it if I knew it was going on and worked on the problem until I found the culprit, but that could take days or more and some very sophisticated and software procedures may be special) , and I'm very concerned about security.  With direct access, it is just too easy to do it in a way that will be almost impossible to detect.  Depending on your operating system and how much effort you want to put into it, there are steps to take to minimize the problem.  If you are allowed to block the person who has access, it becomes even better.  If the question concerns only protect against certain types of espionage (as opposed to any type), then it becomes easier again - but even in this case, there are some guarantees if they have the same level of access (or access) and direct access to your computer.

    In some cases, using spyware on yourself (that you install to spy on your own computer) can detect other spyware activity or activities (I used successfully this particular thing before) - but there is no guarantee (as it can potentially be bypassed if anyone knows there or by using techniques that do not trigger to detect activity) - but it has sometimes proved effective (note it does not - it CAN help to) detect if things and knowing that and possibly how it is done you can take improved or maybe even effective preventive measures until the inability to spy is detected and then they would just adapt to overcome or escape from your preventive measures).

    The honest answer is that, to get the protection you want, you need to block to have this level of access to your computer (after a format and a clean install in order to eliminate what they've already done).  Once they are blocked, then the methods to use normally appear more ordinary procedures, if you knew what to look for.

    If you allow me, why you allow him to have access to your computer?  If you are trying to overcome parental control, then I will not help you and you should reconsider what you're trying to do (and even if it works, they will know that you have done and can eventually impose restrictions that greatly limit your activities and who are far worse than the spy was in the first place - that is how I would react as a parent).  If you try to overcome the employer monitoring, efforts to work around could have consequences job that you do not want to happen.  If it isn't, then why are you allowing this access and what are the rules for your ability to restrict this access somehow?   Also, is there a specific business type that you are specifically concerned about or is this activity?

    As Robert has said, it is better, if this is done in a separate thread, but if you want me to participate, at least after the link to this new thread here as an answer I cannot not otherwise it exists and it will almost certainly miss myself (although others can certainly help you as well).

    I hope this helps.

    Good luck!

    PS Instead of creating another post for your other question, see the following for an explanation of the features of keylogger: http://en.wikipedia.org/wiki/Hardware_keylogger (NOTE: it's hardware, not software since you said "peripheral").  Keylogging can be done using software as well.  For more information about keylogging devices and make sure that not all of these sites are safe (as with any general research), see the general Bing following research: http://www.bing.com/search?q=keylogger+device&PC=BB07&QS=n&first=11&FORM=PERE.

  • I have a pdf form that has 4 columns, with each column having 28 check boxes and text between. I did so he goes by column, but when I do anything for a checkbox it takes it out of line. How can I keep that from happening?

    I have a pdf form that has 4 columns, with each column having 28 check boxes and text between. I did so he goes by column, but when I do anything for a checkbox it takes it out of line. How can I keep that from happening?

    You talk about the tab order? If Yes, go to Edit - Preferences - forms and make sure the box "Automatically adjust tab order when changing fields" is NOT checked.

  • How to remove a user from the application

    How to remove a user from the EBS application?

    12.1.3 R

    Hello

    You can put an end to the user date

    Connect to Oracle Applications - select the responsibility of the system administrator - security - user - define - query with the username - and then you can give the end date in the effective Date column.

  • How do you show photos from iphoto via AppleTV

    How do you show photos in Iphoto on your MacBook via AppleTV to the TV?

    Via home sharing.

    1. You need to enable sharing of home on the Apple TV (settings > computers on Apple TV 2 or 3: settings > accounts on Apple TV 4)
    2. You need to enable sharing of home on your computer (iTunes > file > home sharing)
    3. You will need to choose iPhoto from the menu drop down and let the photos you want to share in iTunes (file > home sharing > choose...)
  • Whenever I have start tabbed FF websites visited before automatically propagate. How can I keep this from happening?

    Whenever I have start FF, tabs in Web sites visited previously spread automatically. How can I keep this from happening?

    Open the Options dialog box (menu, select Tools > Options).
    Go to the general Panel and in the start-up section change the option for "Firefox start"

  • need to take my computer back in the day that I first started it on7/21/2011 my restore point back up to now how can you start over from scratch with no disc?

    need to take my computer back in the day that I first started it on7/21/2011 my restore point back up to now how can you start over from scratch with no disc?

    Most OEM computers have a partition on the hard drive, that allows to give it bought as provided.  Usually, you activate this feature by pressing a key or combination of keys when the first splash screen appears at startup.  Look quickly at the first screen that appears, and you could see the key that you press.  Otherwise, go to your computer manufacturer's website and download the manual for your computer.  Instructions must be there.

    HTH,
    JW

  • How did you record pictures from a memory card on computer?

    How did you record pictures from a memory card on computer do not directly use HP Photosmart 7520 web services?

    No, that would be the only way to access the memory card.

  • How do you keep icons on the desktop to move?

    Original title: the desktop icons

    How do you keep icons on the desktop to move?

    Hello

    Right-click on an empty area of the desktop

    Select display

    Select the icons snap to grid

    It should align them to the left

  • When I Zoom in on a photo, the quality decreases. How can I keep that from happening?

    When I Zoom in on a photo, the quality decreases. How can I keep that from happening?

    [Moved General forums, all-Adobe, unsupported forum lounge to a more specific product - MOD support forum]

    Working with larger images.  More pixels = more information.

    Nancy O.

Maybe you are looking for

  • Mail add an account error - account already exists

    With the help of El Capatain.  In the iMac Mail application I don't see an e-mail account.  It does not appear in e-mail accounts or in the preferences.  When I try to add email as a new account, I get the message "account already exists."  How do I

  • Re: Tecra A10 - can I install Windows 7 64 bit?

    Hello Toshiba & Forum I want to buy a Tecra A10 1GV, but always delveres Toshiba laptop with a 32-bit Windows 7 ProfIn my eyes that seems to be a Ferrary with a steam engine. The version of recovery sometimes offer 32 and 64 bit Installation.Does any

  • For Equium L20 factory reset

    Recently I went to run a new anti-virus program that I had downloaded, but it said I didn't have enough room to run it. I went to the list of add or remove programs and essentially removed everything that I have ever used, or he said had not been use

  • Usar iTunes download sem

    Minha Smarttvnao lap download iTunes POI naotemmemorias

  • Satellite T - FN toolbar no longer appears

    Hi, I made a few changes on my startup item, but now I saw that when I press on touch you FN the label that appears toward the top of the screen were eliminated. How can I do to appear new? Sorry, writing, but I'm Portuguese so if you do not understa