Browse Definitions :
File Extension

LNK File Format

Shortcut file (Microsoft Windows 9.x)

LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an executable file, instead of having to navigate to the executable.. LNK files contain some basic properties, such as the path to the executable file and the “Start-In” directory. LNK files use a curled arrow to indicate they are shortcuts, and the file extension is hidden (even after disabling “Hide Extensions for Known File Types” in Windows Explorer).

 

MIME type: application/x-ms-shortcut

 

Learn more about .LNK files:

Visit the Microsoft Developer Network web page.

See answers to .LNK-related questions at ITKnowledgeExchange.com.

This was last updated in July 2010
Browse File Extensions Alphabetically:

Ask a Question. Find an Answer.

Ask your peers a question about this file extension.

Ask a Question

Join the conversation

8 comments

Send me notifications when other members comment.

Please create a username to comment.

lnk is attached to several my file names. I cannot open such files with photoviewer. I think they are connected with executable links in some way because several of my desktop ikons have also become some type of (windows) generic icon. I think I may have created these in some way.spirit
Cancel
I TRIED TO OPEN PINBALL GAME AND I ACCIDENTLY TRIED TO OPEN IT WITH ADOBE AND ALL MY ICONS CHANGED TO ADOBE AND THEN I TRIED TO OPEN IT WITH THE INTERNET AND IT CHANGED ALL MY ICONS AND THEY ARE NOT WORKING OR OPENING
Cancel
When I shared a folder in dropbox the mp3 music files were converted to shortcut links that I cannot open
Cancel
i am an amateur coder, and i decided to download python and run pip through it. all went well until i attempted to get the file and i had to type "python get-pip.py" into command prompt. it said syntax error and i checked the directory and get-pip.py.lnk was just sitting there in my directory, mocking me, and it's stupid and won't open.
Cancel
I recently found 25 of these files in the root directory of my hard drive. They have various dates of creation over a three year period. I have no ideal how or where these files come from.
Cancel
I'm trying to download a file but it has this extension. When I download it, it instead creates a .download file extension and when I try to open it, it asks me what program I want to use to run it. What should I do?
Cancel
My apps in computer are the same apps. I want to fix them usual. How can I fix them?
Cancel
Have my files as Word and PDF in flash memory stick which work in Apple. This time when I tried to open these documents, they were converted into ink file and are not readable any more. How can I change them into old format.
Cancel

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close