Browse Definitions:
File Extension

LNK File Format

Shortcut file (Microsoft Windows 9.x)

LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an executable file, instead of having to navigate to the executable.. LNK files contain some basic properties, such as the path to the executable file and the “Start-In” directory. LNK files use a curled arrow to indicate they are shortcuts, and the file extension is hidden (even after disabling “Hide Extensions for Known File Types” in Windows Explorer).

 

MIME type: application/x-ms-shortcut

 

Learn more about .LNK files:

Visit the Microsoft Developer Network web page.

See answers to .LNK-related questions at ITKnowledgeExchange.com.

This was last updated in July 2010
Browse File Extensions Alphabetically:

Ask a Question. Find an Answer.

Ask your peers a question about this file extension.

Ask a Question

Join the conversation

8 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

lnk is attached to several my file names. I cannot open such files with photoviewer. I think they are connected with executable links in some way because several of my desktop ikons have also become some type of (windows) generic icon. I think I may have created these in some way.spirit
Cancel
I TRIED TO OPEN PINBALL GAME AND I ACCIDENTLY TRIED TO OPEN IT WITH ADOBE AND ALL MY ICONS CHANGED TO ADOBE AND THEN I TRIED TO OPEN IT WITH THE INTERNET AND IT CHANGED ALL MY ICONS AND THEY ARE NOT WORKING OR OPENING
Cancel
When I shared a folder in dropbox the mp3 music files were converted to shortcut links that I cannot open
Cancel
i am an amateur coder, and i decided to download python and run pip through it. all went well until i attempted to get the file and i had to type "python get-pip.py" into command prompt. it said syntax error and i checked the directory and get-pip.py.lnk was just sitting there in my directory, mocking me, and it's stupid and won't open.
Cancel
I recently found 25 of these files in the root directory of my hard drive. They have various dates of creation over a three year period. I have no ideal how or where these files come from.
Cancel
I'm trying to download a file but it has this extension. When I download it, it instead creates a .download file extension and when I try to open it, it asks me what program I want to use to run it. What should I do?
Cancel
My apps in computer are the same apps. I want to fix them usual. How can I fix them?
Cancel
Have my files as Word and PDF in flash memory stick which work in Apple. This time when I tried to open these documents, they were converted into ink file and are not readable any more. How can I change them into old format.
Cancel

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close