______
______
__ __
/_____/\
/_____/\
/_/\/_/\
\:::_ \ \
\::::_\/_
\ \ \ \ \
\:(_) \ \
\:\/___/\
\:\_\ \ \
\: ___\/
\_::._\:\
\::::_\/\
\ \ \
/____\.:|
\::\ \
\_\/
\_____\/
\__\/
______
__ ___
________
______
/_____/\
/__/\ /__/\
/_______/\
/_____/\
\:::__\/
\::\ \\ \ \
\__.::._\/
\:::_ \ \
\:\ \ __
\::\/_\ .\ \
\::\ \
\:(_) \ \
\:\ \/_/\
\:: ___::\ \
_\::\ \__
\: ___\/
\:\_\ \ \
\: \ \\::\ \
/__\::\__/\
\ \ \
\_____\/
\__\/ \::\/
\________\/
\_\/
I get this trick from a sysadmin friend. it allows to enter system level shell access in Windows Vista and later versions. useful for bypass UAC and ntfs file permission issues.
sc create SuperCMD binPath= "C:\WINDOWS\system32\cmd.exe /c c:\windows\system32\cmd.exe" type= own type= interact
usage:
net start supercmd
and you're in system desktop now.