For example, if a utility named: It must be written portably as: Redirection Multi-digit file descriptors are now allowed syntactically, although a portable application cannot use numbers higher than 9, because the shell can reserve all higher numbers for its own use. The new noclobber version of redirection can be used for creating lock files in applications or determining that a file can be created safely without replacing an existing file.
One example is the System Volume Information folder found in the root of your hard drives which cannot be opened. Close the file and try again. The reason these items cannot be accessed is because they are either intentionally locked to prevent access or are open and in use by the operating system meaning nothing else can can touch them.
Various methods to unlock these files so you can gain access and manually copy them would include trying an unlocking tool like Unlocker.
Other ways to accomplish the task of removing command x copy overwrite all in use status are the Volume Shadow Service VSS which takes a snapshot of the required files, or using low level disk access to gain access which can help bypass certain windows restrictions.
Here we show you 7 different tools that can get access to those locked or in use files allowing you to copy or back them up manually. Shadow Copy Shadow Copy uses the Volume Shadow Service allowing you to copy locked and in use files from one location to another with the aid of a simple user interface.
It does need installing but you can easily copy the Shadow Copy folder from Program Files and then uninstall again to run the program portably in future.
There are a few tick box options below to copy subdirectories, overwrite existing files, ignore errors and parse junction points. Running from the command line is supported but all that really does is open the user interface with predefined from and to locations set and automatically starts the copy.
Download Shadow Copy 2. It has a few commands to create a full or incremental backup but these are not required for copying in use or locked files. The command and arguments for that purpose are quite simple: To copy individual files from the Config folder append them to the end of the line: Click Add to find a source folder, click and browse for a destination folder, press Find Hobo to locate the HoboCopy executable and then press the Backup button.
Weirdly Hobo GUI is only 40K in size but requires installation although you can easily bypass this by extracting the installer file with 7-Zip and keeping it as a portable tool. Although it still works fine, HoboCopy itself was discontinued by its author in favor of ShadowSpawn, which is below.
ShadowSpawn is command line only and relies on the end user having knowledge of other copy tool commands as well as its own.
It works by copying the specified folder to a temporary RAM drive using VSS, and in the same command you supply the copy command and arguments from the copy utility using the RAM drive letter as the source.
You can actually browse and copy most shadowed files from Windows Explorer without a third party copying tool using a command like below: This will open shadowed drive y: This makes it very easy to use and allows you to copy whole folders full of locked files with minimal fuss.
Right click on the entry, select Save to disk and choose the folder you want to save to. PC Hunter If OSForensics is a bit too much for you, PC Hunter is worth a try because it provides a similar Explorer like file and folder tree view so you can easily copy in use files or a whole folder.
PC Hunter is actually an advanced anti rootkit tool that operates at an extremely low level on the system, as a result it may trigger an alert in your antivirus. For such a powerful tool PC Hunter is remarkably simple to use, run the portable bit or bit executable, click on the File tab and use the folder tree to locate the file you want to copy.
Right click on the file and choose Copy to. One issue is selecting more than one file will grey out the option although you can still duplicate the whole folder by right clicking on it in the folder tree and using the Copy to option.
For advanced users PC Hunter is also very capable at deleting hard to remove files and registry entries although it needs to be used with care. Download PC Hunter 6. This has the side effect of bypassing locking or in use restrictions imposed by the operating system.
Run the Extents executable and press Open to look for the in use file. The display will show the disk cluster details of the file. Click the Dump button and choose the save location and filename, make sure to use the same filename and include the extension.
The biggest obvious difference is the fact RawCopy is used from the command line only and has no user interface.Robocopy, is a command-line directory/file replication command.
By default Robocopy will only copy a file if the source and destination have different time stamps or different file sizes. NAME; SYNOPSIS; WARNING; DESCRIPTION; EXAMPLES. As an interactive shell; From shell scripts; On one command line; Mount disks automatically; As a script interpreter.
Displays or modifies file extension associations ASSOC [.ext[=[fileType]]].ext Specifies the file extension to associate the file type with fileType Specifies the file type to associate with the file extension Type ASSOC without parameters to display the current file associations.
XCOPY. Copy files and/or directory trees to another folder. XCOPY is similar to the COPY command except that it has additional switches to specify both the source and destination in detail. If you do not include a MM-DD-YYYY value, xcopy copies all Source files that are newer than existing Destination files.
This command-line option allows you to update files that have changed. This command-line option allows you to update files that have changed. The syntax and use of the command "Xcopy" is described. Of all the command line executables, Xcopy is one of the most useful for the average home PC user.
It provides a powerful and versatile method for copying and backing up files and directories.