473,396 Members | 1,785 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to restrict the file access

3
Hi all,
assume that i have stored an image in some folder through my c# windows forms application. As soon as i store it, i want to make it read protected and copy protected through my application only.. How can i do it?
Kindly give me an idea of doing it... Is there any option available in .NET to do it?
Feb 28 '08 #1
5 1428
davidson1
144 100+
Store Ur Image or File in the Web server

It will be Protected.........
Feb 28 '08 #2
thunga
3
My idea is to store an image in a shared folder that will be created on the server machine.As soon as any client adds an image into that shared folder, that image should be made read, write and copy protected....

How can i do that?
Feb 28 '08 #3
davidson1
144 100+
Suppose U have image folder

C:\Image in server Machine

here Administrator can Add or Remove Image



and give link to that folder so that others can Access, Others can't delete the image inside the image folder they dont have rights , only Administrator can delete it...........
Feb 28 '08 #4
thunga
3
but i don't want them to access...........

let me explain u clearly....

first of all, everything should happen through my C#.Net application.
till now i am able to put thei mages into a folder called Images that i have created in my c drive..
Now i should write a code in such a way that when the end user on the client machine adds an image into it, the code should make it copy protective...

And when ever the enduser on the client side wants to view the images, the code(application) should take each image from that folder(image foleder), make it copy free put it in the list view and then again make it copy protective.....

The only problem, but difficult problem ,that i am facing is how to make an image copy protective...

If u could please give me an idea/code snippet of how to make an image(or any file) copy protective, then everything becomes so simple....
Feb 28 '08 #5
davidson1
144 100+
Can You Tell in Ur Point what Copy Protective Mean.... I cant Understand it Properly......
Feb 28 '08 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: James | last post by:
Hi, I am running a virtual hosting server. The configuration of server is as follows: Windows 2000 IIS 5.0 All the virtual hosting sites are running as seperate user ie for the site...
3
by: Paul | last post by:
Hi all, at present I I've built a website which can be updated by admin and users. My problem, I've combined "log in" and "access levels" to restrict access to certain pages, using the built...
4
by: Vijay Kumar R Zanvar | last post by:
Greetings, Are the following inferences of mine correct? 1. #include <string.h> char *strcpy(char * restrict s1, const char * restrict s2); a. s1 != s2 b. That means,
7
by: tweak | last post by:
Can someone give me a short example as how to best use this keyword in your code? This is my understanding: by definition restrict sounds like it is suppose to restrict access to memory...
5
by: toddles666 | last post by:
Hi- Is there any way of restricting access to a database by application & account? For example, I only want the application APP1 to access the database using the USER1 account. I've tried to...
12
by: Me | last post by:
I'm trying to wrap my head around the wording but from what I think the standard says: 1. it's impossible to swap a restrict pointer with another pointer, i.e. int a = 1, b = 2; int *...
21
by: Niu Xiao | last post by:
I see a lot of use in function declarations, such as size_t fread(void* restrict ptr, size_t size, size_t nobj, FILE* restrict fp); but what does the keyword 'restrict' mean? there is no...
2
by: Frederick Gotham | last post by:
I'm going to be using an acronym a lot in this post: IINM = If I'm not mistaken Let's say we've got translation units which are going to be compiled to object files, and that these object...
6
by: rainy6144 | last post by:
Does the following code have defined behavior? double *new_array(unsigned n) { double *p = malloc(n * sizeof(double)); unsigned i; for (i = 0; i < n; i++) p = 0.0; return p; }
2
by: phpnoob | last post by:
I have a php script that processes a form and then posts the user input to a data file on the server in a comma delimited format. For simplicity call the file "data.csv." The script is working...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.