473,595 Members | 2,442 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Code Acces Security without CASPOL or MSCORCFG

Hey, can I execute a FileIOPermissio n on a mapdrive without using the caspol
tool or the mscorcfg configuration editor? - it have to be working

If not, can everbody describe a solution to set FullTrust for strong named
assembly with caspol.exe? I've tried a lot of things, using the params from
caspol.exe but it had never worked. Thanks a lot and have a nice day

cryptic
Aug 20 '08 #1
0 911

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
2349
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Before we start with our sample app we need to view the security configuration files on the machine. You will find them under <drive>\WInNT\Microsoft.NET\FrameWork\<version>\Config Enterprise Level Security configuration file is :- enterprise.config Machine Level Security configuration file is :- security.config
0
1289
by: Nick | last post by:
Replying to x-post "Nick" <someone@somewhere.com> wrote in message news:ehLJlC52EHA.1564@TK2MSFTNGP09.phx.gbl... > Hi all, > > Using the .NET fx configuration utility, mscorcfg is it possible to > completely lock down a client computer and ensure that only our (software > publisher) managed and unmanaged applications can run on it? >
0
1432
by: Mark Broadbent | last post by:
Could someone who has active experience of assigning Security Policys please clarify my follow comments... Having gone through the MSDN documentation on this subject, my condensed version of the way the security code permissions works is thus :- 1. An Assembly will be mapped to one or more Code Groups based upon the membership conditions specified within each code group. 2. When an assembly belongs to multiple code groups,...
0
2083
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run or it attempts to perform an action which doe not have the required permissions then its execution...
3
1260
by: marcmc | last post by:
When I distribute myApp to a network drive I get an error. Tells me I need to change my secority policy so I write a batch file as follows: C: CD\ CD C:\WINNT\Microsoft.NET\Framework\v1.1.4322\ CLS caspol -quiet -cg 1.2. FullTrust
0
2494
by: Peter F | last post by:
Hello I hope you can help my with this... I have made a program in VB.Net, which is suppose to be in a shared directory on a server. Other people can then map the drive and run it from their client. The problem is just that to run the program (which is doing some file writing) from the clients you have to change security policy settings i.e. give the assembly (the program) full trust. It is working when I am changing it with the...
10
1667
by: Richard MSL | last post by:
I am having problems working with .net security. I have been attempting to use the Microsoft .Net Framework 2.0 Configuration tool (version 2.0.50727.42), but it won't work for me. I have a simple test application that works, when I run to Manage Applications - View Assembly Dependencies, I get an error that says: Unfortunately, the .NET Framework Configuration tool cannot show this list of assembly dependencies for this application due...
4
2202
by: Chris Dunaway | last post by:
We have an app that will be run from a network share. I know that on the machine that will run the app, I need to grant the proper permissions. On the laptop, I installed the .Net framework verson 2.0 (dotnetfx) but when I went to the control panel under administrative tools, the .Net 2.0 configuration tool was not there. The 1.1 tool was there, but not the 2.0 tool. How do you configure code access without that tool? Chris
3
1332
by: =?Utf-8?B?SmFtZXMgV29uZw==?= | last post by:
Hi everybody, I'm facing a problem to run an appliation in a shared network drive. The application is developed in VB2005. I understand I have to add a signature with strong name key to all assambies. I found that I have to modify security policy to trust strong names. I want to clarify the followings: 1. Does it mean I have to modify the security policy for each client machine which runs my application in network drive?
0
7957
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8262
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8379
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8020
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
6675
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
5839
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5421
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
3875
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
3915
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.