473,386 Members | 1,706 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Security Zone In IE!

Hi Guys...

it's been awhile since I 've last posted....

Does anyone knows how to get the Security Zone using Javascript or Server
Side Script? say like when you access a Web page.... the bottom right of the
IE will indicates the security zone, I have googled throught but no info on
it.. cos I need to know security zone before rendering my page to the users.

Please Advise,
LaVey


Apr 28 '06 #1
1 1052
you can not get it easliy. even if you knew the zone, you would have to look
up the security setting for the zone. None of this is exposed to javascript
or the server.

A more practial solution is to use a sniffer page to test for the
permissions you need. For example test if client script is enabled, you can
create objects desired, etc.

-- bruce (sqlwork.com)


"Nigil LaVey" <la***@pacific.net.sg> wrote in message
news:Oz**************@TK2MSFTNGP05.phx.gbl...
Hi Guys...

it's been awhile since I 've last posted....

Does anyone knows how to get the Security Zone using Javascript or Server
Side Script? say like when you access a Web page.... the bottom right of
the IE will indicates the security zone, I have googled throught but no
info on it.. cos I need to know security zone before rendering my page to
the users.

Please Advise,
LaVey

Apr 28 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Neo | last post by:
I have a usercontrol that I am trying to use as an ActiveX Control on a WebPage, however it refereneces an Assembly that whenever the first call is made to anything in the Assembly a Security...
3
by: Dag Sunde | last post by:
I have this little test-page using Ajax to grab a simple date-string from the server. This works as expected in IE, FF, NS, etc. This morning I changed the path to my little server-side...
2
by: Matt Theule | last post by:
Where can I find information about Runtime Security Policies? I have a winform that is hosted in a webform that needs to access the filesystem. Using the Configuration mmc snapin, I have created a...
1
by: david.kao | last post by:
Hi All: Yesterday, we released our first .NET window based program on company’s network. In order to make our .NET program run correctly from a shared network driver, we also installed a...
0
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to...
16
by: Marina | last post by:
Hi, I am trying to find the minimum security settings to allow a windows control embedded in IE have full trust. If I give the entire Intranet zone full trust, this works. However, this is...
4
by: Alexey Smirnov | last post by:
I have intranet application based on ASP.NET on Win2000AS (Framework 1.1). Website uses an Integrated Windows Authentication as Authentication method in IIS and has following security...
3
by: Mike | last post by:
Hi I have problem as folow: Caught Exception: System.Configuration.ConfigurationErrorsException: An error occurred loading a configuration file: Request for the permission of type...
1
by: =?Utf-8?B?U2FtIE1jSW50eXJl?= | last post by:
I have a big problem - can anyone help a distressed woman here? I installed Zone Alarm Security Suite and then after a while I didn't like the software so I removed it properly, but then...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.