• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft introduces linux like 'sudo' command to windows 11

Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11

You are here: Home / General Cyber Security News / Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11
February 12, 2024

Microsoft reported it truly is introducing Sudo for Windows 11 as part of an early preview model to assist consumers execute commands with administrator privileges.

“Sudo for Windows is a new way for customers to run elevated commands directly from an unelevated console session,” Microsoft Product or service Manager Jordi Adoumie stated.

“It is an ergonomic and familiar alternative for buyers who want to elevate a command without having to first open a new elevated console.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Sudo, quick for superuser do, is a plan for Unix-like computer working programs that makes it possible for people to run applications with the security privileges of another person, typically a person with elevated permissions (e.g., administrator).

Cybersecurity

The element is accessible for Windows 11 builds 26045 and afterwards. It can be enabled by heading to Configurations > System > For Builders, and setting “Enable sudo” to On.

Sudo for Windows arrives with 3 options: operate programs in a new elevated console window, operate the elevated course of action in the existing window but with the enter stream (stdin) closed, and in inline manner.

Sudo for Windows 11

“The inline configuration alternative runs the elevated course of action in the recent window and the course of action is in a position to get enter from the existing console session,” Redmond warns in its documentation.

“An unelevated process can mail input to the elevated procedure within the exact same console windows or get info from the output in the current windows in this configuration.”

Microsoft stated it is really also in the system of open-sourcing the undertaking on GitHub, urging other buyers to lead to the initiative as very well as report issues and file aspect requests.

Observed this report interesting? Stick to us on Twitter  and LinkedIn to read through far more exclusive material we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «u.s. offers $10 million bounty for info leading to arrest U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders
Next Post: Why Are Compromised Identities the Nightmare to IR Speed and Efficiency? why are compromised identities the nightmare to ir speed and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.