DELTREE

In computing, DELTREE (short for delete tree) is a command line command in some Microsoft operating systems, SpartaDOS X[1] and FreeDOS[2] that recursively deletes an entire subdirectory of files.

DELTREE
Developer(s)Microsoft, Datalight, Charles Dye
Initial releaseMarch 1993 (1993-03)
Operating systemMS-DOS 6, SpartaDOS X, ROM-DOS, FreeDOS, Windows 9x
TypeCommand
LicenseMS-DOS, ROM-DOS, Windows: Proprietary commercial software
FreeDOS: GPL v2

Overview

When IBM and Microsoft introduced PC DOS 1.0 and MS-DOS 1.0, subdirectories were not yet supported. This state of affairs was remedied with the release of DOS 2.0, which introduced support for subdirectories and directory nesting; however, it had no built-in facility for deleting entire subdirectory trees.[3] Through the release of MS-DOS 5.0, removing nested subdirectories required removing all of the files in the lowest subdirectories, then removing the subdirectory itself, then repeating the process up the directory tree. By 1991 at least one competing product, DR-DOS, had introduced a well-received utility that enabled recursive file deletion.[4] With the introduction of MS-DOS 6.0, Microsoft regained parity by adding the DELTREE command.[5]

DELTREE was retained in Windows 9x but was not shipped in Windows NT family of operating systems. Instead, the rmdir (alias rd) command removes a subdirectory along with all its files if the /S command-line switch is given.[6]

Implementations

In MS-DOS, PC DOS and Windows 9x, DELTREE was implemented as an external command, with its functionality kept in a separate file outside of COMMAND.COM.[7] Normal operation prompted the user for verification that the specified directories were indeed intended to be removed, but this safeguard could be suppressed with a command-line option.[5] Unlike most other commands that operated on the file system, multiple directories could be passed to the command at one time.[8] An undocumented feature allowed the user to append a trailing "/" character to a directory name in order to preserve the directory but remove everything underneath it.[9] In theory, deleted material could be recovered.[8]

Datalight ROM-DOS[10] also includes an implementation of the DELTREE command.

The FreeDOS version was developed by Charles Dye and is licensed under the GPL v2.[11]

Syntax

The command-syntax is:

DELTREE[/Y][DRIVE:][PATH]

Use in malware and sabotage

DELTREE was designed to ignore all file and directory attributes, such as hidden, read-only and system.[9] The command was described as "potentially dangerous" and "capable of wiping out hundreds of files at a time".[5] Combined with the PURGE command (which prevented data recovery), it became an example of a worst-case payload for malware[12] as well as figuring in one of the early computer sabotage trials.[13][14]

Contributing to the problem is the fact that MS-DOS and Windows 9x do not support discretionary access control to mitigate this issue. The Windows NT family does. Furthermore, starting with Windows Vista, mandatory access control and User Account Control further mitigate the issue.

See also

References

  1. SpartaDOS X 4.48 User Guide
  2. http://freedos-project.blogspot.com/2018/06/freedos-commands-quick-reference.html
  3. Dickinson, John (May 28, 1985). "Stalking the Elusive Subdirectory Path". PC Magazine. p. 231.
  4. Glass, Brett (July 8, 1991). "MS-DOS 5: Reigning OS improves its value". InfoWorld. pp. 64–66.
  5. Cooper, Jim (2002). Using MS-DOS 6.22 (3rd ed.). Que. pp. 120–121. ISBN 0-7897-2573-8.
  6. No DELTREE Command? - MalekTips Archived March 17, 2010, at the Wayback Machine
  7. Crayton, Christopher (2008). The A+ Exams Guide: Preparation Guide for the CompTIA Essentials. CompTIA. p. 336. ISBN 978-1-58450-566-2.
  8. Mueller, John Paul (2007). Windows Administration at the Command Line for Windows Vista, Windows 2003, Windows XP, and Windows 2000. Wiley. pp. 28–29. ISBN 978-0-470-04616-6.
  9. Rubenking, Neil J. (November 19, 1996). "User-to-User". PC Magazine. p. 247.
  10. "Datalight ROM-DOS User's Guide" (PDF). www.datalight.com.
  11. http://www.ibiblio.org/pub/micro/pc-stuff/freedos/files/distributions/1.2/repos/pkg-html/deltree.html
  12. Glass, Brett (May 2, 1994). "How to safely defuse an ANSI bomb; video scan converters". InfoWorld. p. 40.
  13. Gaudin, Sharon (2000). "Case Study of Insider Sabotage: The Tim Lloyd/Omega Case" (PDF). Computer Security Journal. 16 (3): 1–8.
  14. Lange, Michele C. S.; Nimsger, Kristin (2004). Electronic Evidence and Discovery: What every Lawyer Should Know. ABA. p. 15. ISBN 1-59031-334-8. The case was litigated as United States v. Lloyd, 269 F.3d 228 (3rd Cir. 201).

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.