473,804 Members | 3,509 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

.Net security for shared network driver

Hi All:
Yesterday, we released our first .NET window based program on company’s
network. In order to make our .NET program run correctly from a shared
network driver, we also installed a security package on each desktop to make
each desktop to trust mapped network driver. In the security package, we
choose the Zone code group; within in the Zone we made Local Intranet
FullTrust. The program is running properly for ninety percent of users.
Except users their network mapping are using IP address. After we modified
the Zone from Local Intranet to Internet FullTrust. Those IP mapping users
are start working correctly now. My question here why there is difference
between mapping network share using machine name and using IP address. Plus
this change will make ours’ machine very dangerous.

DK
Nov 17 '05 #1
1 1644
"da*******@opco .com" <da************ *@discussions.m icrosoft.com> wrote in
message news:BC******** *************** ***********@mic rosoft.com...
Hi All:
Yesterday, we released our first .NET window based program on company's
network. In order to make our .NET program run correctly from a shared
network driver, we also installed a security package on each desktop to
make
each desktop to trust mapped network driver. In the security package, we
choose the Zone code group; within in the Zone we made Local Intranet
FullTrust. The program is running properly for ninety percent of users.
Except users their network mapping are using IP address. After we modified
the Zone from Local Intranet to Internet FullTrust. Those IP mapping users
are start working correctly now. My question here why there is difference
between mapping network share using machine name and using IP address.
The intranet vs internet distinction is made largely based on the host name.
If it has any dots (.), it is assumed to fall in the internet zone. Since
the IP addresses include dots, they're being evaluated as falling in the
internet zone. Unless you can remap the share on these machines to use the
machine name rather than its IP address, you should definitely choose a more
restrictive policy change (e.g.: based on URL rather than the entire
internet zone).

Plus
this change will make ours' machine very dangerous.
Yes, it's very dangerous, and you should reverse the change on those
machines. The fully trusted intranet zone on the other machines is also
potentially dangerous, and it might be a good idea to move to a more
specific policy alteration even on those (e.g.: strong name and/or URL
within local intranet zone).

DK

Nov 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
4205
by: Mike MacSween | last post by:
My client has an MS Access database application on her local machine. I have full access to that in terms of changing the design. I've got a simple PHP/MySql application on shared hosting, so no direct access to the db server. I'd like to give her the facility to export the information in her local Access application to the shared PHP/MySql site. From one command button (or similar) in the Access application.
4
1731
by: Ant | last post by:
I am trying to apply security to a database I have just finished. The application is split into a back end of tables and a front end of forms etc. I need some users to have access to forms based on some queries but not others. My question is do I run the security wizard in the back end DB or the front end? If I just do the front end I seem to have more control (Queries, individual forms etc) but what’s to stop some one just opening the...
3
3716
by: Frank | last post by:
We have an Access database Sch_S.mdb in the shared driver S across the network. I have a copy of that database in my local driver C, named as Sch_C.mdb. As per users' request I added some check boxes in the main form of the database, and added some relevant subroutines in that form. Now I need to put the modified database Sch_C.mdb to the shared S driver. Since new data had been added to tables (say T1, T2) in Sch_S.mdb while I was...
1
2500
by: Fred Mellender | last post by:
I wish to run a C# Windows Forms program on a Windows 98SE machine, from a directory that is owned by a Windows XP machine. The directory is shared via directory sharing from the XP machine to the W98SE machine via a TCP/IP network. This directory holds Foo.exe, and I want to run the program on the W98SE machine by clicking on Foo.exe. I *am* able to run a C# console application without problem from the shared directory. So I presume...
0
982
by: david.kao | last post by:
Hi All: I am releasing a Win Client .Net program with Web Service in strong name though a shared network driver, and on each user’s desktop I am giving a machine level full trust with my win program’s strong name key. Everybody seem working fine, except one user, his machine has no trouble to launch my app. But when my app starts talk to Web service, his machine gives him a permission error on Reflection. Here is the error message:...
3
2098
by: abcd | last post by:
When I use <identity impersonate="true"> I get following error. My goal is to access Microsoft Access file from another machine on the domain from my asp.net applicaiton....what could be the best way ERROR Disk or network error. ERROR Driver's SQLSetConnectAttr failed ERROR Disk or network error. Description: An unhandled exception occurred during the execution of the current web request. Please review the stack trace for more...
1
6128
by: sathyp | last post by:
Public Function SetPrinterDefaultsW(ByVal sPrinterName As String, _ ByVal nPaperSize As Long, ByVal nOrientation As Long) As Boolean Dim Prn As Printer Dim hPrinter As Long Dim pd As PRINTER_DEFAULTS Dim pinfo2 As PRINTER_INFO_2 Dim pinfo8 As PRINTER_INFO_8 Dim pinfo9 As PRINTER_INFO_9 Dim dm As DEVMODEW Dim yDevModeData() As Byte
18
2037
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all of the relevant facts. Second, despite the fact that I think the obvious 'quick' answer to my question would be 'Yes', I am seeking your wisdom and recommendation to the question as to this particular set of circumstances. I have 20 Security...
21
4372
by: Cron | last post by:
Hi I've completed work on an access2007 database which is to be run on a network server by many users at the same time. Every time the database is opened on a new computer I get the "Certain content in this database has been disabled" warning at the top. How do I avoid this please? My users would not know to click the bar and enable the content. I've tried digital signing but it I can only seem to do it by packaging the database which...
0
9708
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9588
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10589
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10085
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7625
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6857
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5527
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5663
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3828
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.