|
by: LRW |
last post by:
Sorry to crosspost, but I have no idea if this is more a PHP question
of general Linux question.
I have a script that makes changes to image files, montages them into
a jpg, and creates a Web page with that image.
It starts with someone from our graphics dept. who I set up to copy
the image files over to the Linux server with SAMBA.
The files gain the owner/group of "nobody" and permissions of 744.
|
by: Glen Scott |
last post by:
Hi, I'm writing an ASP app that administers an ISA server remotely.
The fact that it's an ISA server isn't my problem I believe.
My question? What is the security difference between disabling
anonymous access and using account X from the web client, versus
allowing anonymous access but using account X as the account that runs
the application?
When I configure my web application to allow anonymous access, but
set the anonymous process...
|
by: Alexandra |
last post by:
Hi,
I have a hidden system file that I need to read.
I am logged in as an administrator.
I can not change the file attributes using the windows explorer.
|
by: cjk |
last post by:
Issue
Our web application requires access to write to a custom event log, yet access is denied. This access is denied because we are using impersonation, and our end-users do not (should not) have permissions to write to a custom event log. We would like to know if someone out there has resolved this problem without incorporating registry hacks, elevating end-user account permissions to admin OR calling native code to logon as the account...
|
by: Jody Gelowitz |
last post by:
We are having an issue in that when trying to read a file that is on Server2
from Server1 (through our ASP.NET project), we receive the error:
Access to the path "\\Server2\MyShare\MyFile.tif" is denied.
Here is the server setup that we have:
Dev - Development Computer on WinXP Pro SP2 (IIS5), VS2003 developing
under .NET Framework 1.1
Server1 - Web Server on Win2003 Server (IIS6)
Server2 - File Server on Win2003 Server
|
|
by: Marcin Zmyslowski |
last post by:
Hello all!
I have the following problem with MS Access 2003 permissions.
I have two users. One is admin and the second one is user who has full
permissions to enter modify and read data.
I have one table and one queries which is based on this table.
This query is good working for these two users.
|
by: Newbie |
last post by:
hi all,
i am doing a project which requires me to provide a security login
feature.
i understand that access has a user level security feature but i could
not use it coz i'm tested on my ability to use existing controls.
i did the login form, then it occured to me that it would be much more
convenient for users to change passwords themselves without needing the
administrator to change for them.
|
by: N. Quisitive |
last post by:
Hello,
I have a dilemma that has haunted me for a couple of months now. I am
developing a content management system for a client who has their
server managed by someone else (to be more specific, this system is
being built for a school in a university; the servers are managed by
the university and are highly secured). The problem is the
administrators will not change the write permissions on the folder I
would like to upload to. After...
|
by: Dave Keen |
last post by:
Hi all
I am writing a webpage which asks the user for the name of a picture
file, then reads the file, resizes if necessary and saves it to the
server. The code to read the file is...
' Set permissions for loaded file.
Dim FileIOPerm1 As
System.Security.Permissions.FileIOPermission
FileIOPerm1 = New
|
by: Day |
last post by:
Hello!
I'm programming in C# on .NET 2.0, Windows XP SP2.
I'm using a third party's DLL in an environment that limits access to
the hard drives save for a single, set user (recognized to access the
drives by name).
The dll functions use Process.Start and run under the logged on User's
context, but I need them to run under those those of the privileged
user's. (I tried using Impersonation, but it only affects the thread
and thus doesn't...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|