473,396 Members | 1,599 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Can the dll used in no touch deployment have unsafe blocks

What are the restrications on unsafe blocks using the object tag or
Assembly.LoadFrom - it does not seem to work for me even with full
trust of the site
Jul 21 '05 #1
2 1157
Notouch deployment is rather limited in where it can access code from.
I haven't tried using unmanaged code in a notouch application, but as a
first place to start looking try to grant unmanaged code permissions to the
code group your notouch application belongs to.
If you don't want to grant global permissions, you could define a custom
code group, sign your application, and grant the permissions to the code
group.
--

Regards

Tim Stephenson MCSD.NET
Charted MCAD & MCSD.NET Early Achiever

"Steven M. Lewis" <sm*****@lordjoe.com> wrote in message
news:3f****************@news.nwlink.com...
What are the restrications on unsafe blocks using the object tag or
Assembly.LoadFrom - it does not seem to work for me even with full
trust of the site

Jul 21 '05 #2
I am already giving the dll a strong name and am granting that name full
trust. I have also tried granting the site full trust and without the
unmanaged block th code routinely exercises that trust to writ to the
file system, read environment variables and access the web.

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Jul 21 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Marek | last post by:
Hi there, my WinForm application has to be installed in "no-touch-deployment" mode, so users can run it from the web. I need to read application's .config file but it does not work in ...
1
by: Steven M. Lewis | last post by:
What are the restrications on unsafe blocks using the object tag or Assembly.LoadFrom - it does not seem to work for me even with full trust of the site
4
by: wobbles | last post by:
Hi Everyone, I'm really struggling to get no-touch deployment to work well (if at all, in some cases). Can anyone recommend a good book on this topic? There seem to be a lot of blogs about...
2
by: Steven M. Lewis | last post by:
What are the restrications on unsafe blocks using the object tag or Assembly.LoadFrom - it does not seem to work for me even with full trust of the site
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.