473,386 Members | 1,785 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

VB.NET runtime requirements

Hello all.
I am deploying a VB.NET Winforms app into a classified environment on winXP sp2. Regular users have reduced rights/privileges. This is non-negotiable.

The app runs as an admin or power user, but not as a "regular user". The app fails very early in the startup process. One wrinkle is that we are using Esri's ArcGIS binaries to do fancy maps.

is it permissions on the assembly ?
ArcGIS COM binaries ?
Registry access?
directory permissions (general) ?
directory permissions (CLR, JIT, GAC ...) ?

any thoughts ? As admin I can grant special privileges to resources.
Mar 20 '07 #1
1 1322
RedSon
5,000 Expert 4TB
Hello all.
I am deploying a VB.NET Winforms app into a classified environment on winXP sp2. Regular users have reduced rights/privileges. This is non-negotiable.

The app runs as an admin or power user, but not as a "regular user". The app fails very early in the startup process. One wrinkle is that we are using Esri's ArcGIS binaries to do fancy maps.

is it permissions on the assembly ?
ArcGIS COM binaries ?
Registry access?
directory permissions (general) ?
directory permissions (CLR, JIT, GAC ...) ?

any thoughts ? As admin I can grant special privileges to resources.
First off are we talking about an ITAR classified environment? If it is, there is no way that we can legally give you any advice about your system. This is something that you are going to have to clear through your administrator.

As for your security questions, I feel very uncomfortable giving you any advice about what types of access you should grant to your registry and directories. A general rule of thumb when designing secure environments is that you want it to be as compartmentalized as possible. You will also need to be very clear about when you grant the write and when you grant the execute permissions. Your application will need dedicated directories, registry and memory footprints, and it should not be allowed to go beyond those boundaries.

Please let us know about the legal status of your environment and then others will be able to offer you more advice.
Mar 20 '07 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

7
by: cppaddict | last post by:
Hi, I've been trying to debug a strange runtime error for the last 5 hours... I'm hoping someone might have an insight about it. I have an application that creates a vector of MyDisplay...
0
by: jangolan | last post by:
Hi, I have written an application in C++ that consumes webservices. The application works great on my pc, which I have visual studio installed. When I deploy the application to other user's pcs,...
3
by: Roberto Castro | last post by:
Hello! I have been assigned for the first time an adp Access project and so far I have managed to make the changes needed for some requirements. However, I am struggling to find the place where...
7
by: Richard Hill | last post by:
Hi, I need Access 2003, and the means to distribute my applications, but I cant work out exactly which software I need to purchase. I am based in the UK, and have Office XP developer edition to...
9
by: Charisma | last post by:
I have a client who is requesting the following: Description: -database should be a runtime version of MS Access so that it would not be necessary for the user to have any Microsoft products in...
4
by: songie D | last post by:
In the file settings for one of the .cpp files in a Win32 unmanaged DLL project, the runtime library it is using by default is Multithreaded Debug. Is there any point in using multithreaded library...
8
by: John | last post by:
Hi I have a set of classes (application framework) in the form of a dll that I have set to install in \ folder by default on the target user's pcs. This path can also be changed by the user when...
13
by: Tim | last post by:
When the Application is started, it has to read a config file. The config file gives details of the objects that need to be created. Based on the info from the config file, the objects need to be...
10
by: Sami | last post by:
Hi, Is there anyway to construct a object of class with its class name obtained dynamically? Prototype and Factory method along with Abstract factory design pattern can be used to do it. But it...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.