473,395 Members | 2,713 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Permissions/Protection

So I recently developed an C# application to be ran by quite a few
people from a shared drive. The application is stored in say:
"ROOT". The program accesses files within say "ROOT\BIN". Is there a
way to allow the program access to this folder, but prevent users from
being abel to access it and view the files directly?

Thanks a lot!!

Apr 10 '07 #1
2 1232
No, there isn't. Programs themselves have no identity, and therefore,
can't have permissions that are granted to them. The program runs under the
user's identity, and what they can do, the program can do.

.NET security will apply a reduction in permissions depending on other
factors, but the reverse can not be applied. You can not have an elevation
of privledges.

Hope this helps.
--
- Nicholas Paldino [.NET/C# MVP]
- mv*@spam.guard.caspershouse.com

<Sh**********@gmail.comwrote in message
news:11*********************@n76g2000hsh.googlegro ups.com...
So I recently developed an C# application to be ran by quite a few
people from a shared drive. The application is stored in say:
"ROOT". The program accesses files within say "ROOT\BIN". Is there a
way to allow the program access to this folder, but prevent users from
being abel to access it and view the files directly?

Thanks a lot!!

Apr 10 '07 #2
<Sh**********@gmail.comwrote in message
news:11*********************@n76g2000hsh.googlegro ups.com...
So I recently developed an C# application to be ran by quite a few
people from a shared drive. The application is stored in say:
"ROOT". The program accesses files within say "ROOT\BIN". Is there a
way to allow the program access to this folder, but prevent users from
being abel to access it and view the files directly?
You could create a User specifically for accessing those files, and grant
permissions on the folder only to that user. Your program would impersonate
that user before accessing the files. Obviously, you keep the password for
that internal user secret from everyone except the program that needs to
impersonate the user.
Code to impersonate a user is available at multiple locations, for
instance, here:
http://www.codeproject.com/useritems...tion_in_Ne.asp
Apr 10 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
7
by: Boni | last post by:
Dear all, in order to protect my assembly component from decompilation I implemented following schema: I created mixed mode C++ project wich has managed cProxy class and unmanaged cMemLoader....
9
by: John | last post by:
Hi, I would like to protect my software from copying. What are best tools for it (hardware protection is not an option), do you have some reccomendation for protection or third party software...
19
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware...
1
by: James Beilby | last post by:
Hello people, It's been a long time since I've asked any techie questions on Usenet but I am under pressure to finish a project and the following issue has me stumped. I appreciate that it's a...
20
by: Paul Bromley | last post by:
Not sure if I can ask the question in this forum - please let me know if it is better elsewhere. Does anyone know of a reasonably priced good copy protection program that will protect software on...
1
by: Andrew Koenig | last post by:
The answer to this question probably involves pywin32 or a similar library. I would like to copy a file from one place to another on a Windows machine while preserving as much of the file...
0
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.