473,750 Members | 2,253 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

reg permissions change?

hi, i sent one of my program to a friend and my program uses the registry to
store values and such that my program needs but he cant run it because he
isnt allowed access to the registry....is there anyway i can change that
access so my program can read, write, delete, etc reg keys? thanks
Nov 21 '05 #1
5 1086
The program is going to run as whoever is logged in. So if the program
doesn't have rights to the registry, that means your friend doesn't. Is your
friend an admin on that machine?

The other thing is, there are other, far easier ways to store program or
user specific information, othern then putting it in the registry. You can
store user specific files, for instance in the application data folder for
the user, which your app will always have access to, for instance.

"iwdu15" <iw****@discuss ions.microsoft. com> wrote in message
news:6A******** *************** ***********@mic rosoft.com...
hi, i sent one of my program to a friend and my program uses the registry
to
store values and such that my program needs but he cant run it because he
isnt allowed access to the registry....is there anyway i can change that
access so my program can read, write, delete, etc reg keys? thanks

Nov 21 '05 #2
No, your program cannot grant access to registry keys that the user does not
have access to. However, their should be certain keys that you can read and
write to. The easiest way is to use the GetSetting and SaveSetting method.

However, .net applications typically store configuration information in an
XML config file, such as app.config, which can be read with
System.Configur ation.Configura tionSettings.Ap pSettings.

"iwdu15" wrote:
hi, i sent one of my program to a friend and my program uses the registry to
store values and such that my program needs but he cant run it because he
isnt allowed access to the registry....is there anyway i can change that
access so my program can read, write, delete, etc reg keys? thanks

Nov 21 '05 #3
yea i kno tat now, i use INI files now...this was an old program...but thanks
anyway
Nov 21 '05 #4
what i described is not the same as ini files

"iwdu15" <iw****@discuss ions.microsoft. com> wrote in message
news:3B******** *************** ***********@mic rosoft.com...
yea i kno tat now, i use INI files now...this was an old program...but
thanks
anyway

Nov 21 '05 #5
iwdu

The user should be able to get access to the current user settings of the
registry.

It would be a great hack if he cannot and still start someting else.

Did you place your information in
Registry.Curren tUser (software)

Hkey_current_us er.software

I hope this helps,

Cor
Nov 21 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
2651
by: Peter Verhelst | last post by:
Hello, Currently I am running an Access database on a windows WTS server, running Microsoft Windows 2000 server 5.00.2195 Service Pack 3. This database should be accessible for everybody in our network, so for the time being, I have changed the permission for the .mdb file to Everone -> Full control (I know this is not professional, but I'll sort out the security issues later). When this database is opened, and closed again, it is...
16
2213
by: Lyle Fairfield | last post by:
There is an MS-SQL table named Bugs_Comments_and_Suggestions. There is a form named Bugs_Comments_and_Suggestions. To allow John Doe to use this form, we GRANT him LOGIN and ACCESS permissions to the db and SELECT permissions on the stored procedure which is the record source for the BOUND form. To allow John Doe to "UPDATE, INSERT, DELETE" using the BOUND form, we GRANT John Doe "UPDATE, INSERT, DELETE" permissions on the table,
2
4353
by: Jozef | last post by:
Hello, Is there a way to change table permissions in VB Code? I can't seem to find much that's concise in the help file. Here's the situation; I have a table in the "data" portion of a split database. The table is a list of values that shouldn't be accidentally changed by the user, so I've taken the administer and delete permissions off. I'm using the regular workgroup file, with the default Admin user name, so there is no funky...
7
960
by: JerryW | last post by:
I just reinstalled .NET 2003 (after repeated attempts to get ASP.NET Web Applications to work). I first did a complete uninstall of .NET 2003, .NET Framework 1.1, and IIS. I also completely deleted c:\inetpub\wwwroot and rebooted before reinstalling. I created a new virtual directory from within IIS (e.g. MyWebTest). Then I tried to create a new Visual C# ASP.NET Web Application pointing to the location http://localhost/MyWebTest. I get...
2
1442
by: \ | last post by:
Problem is something like this. Some web applications written in php change permissions of some files and directories so I can't remove them if I don't change permissions to write those files and dir's. I can do that by making a php file with code : <?php chmod ("dir-or-file", 0777); ?> and send it to server and point browser to that file.After that I can
10
2619
by: John Salerno | last post by:
I always read about how you need to set certain file permissions (for cgi files, for example), but it's never been clear to me *how* you do this. I know you can run the line chmod 755 scriptname.py but *where* do you run this? Is this done on your personal system, or on the server? What if you are using Windows? If it's done on the server, how do you do it?
1
2434
by: SysProg | last post by:
I need some help with a problem I've encountered. I am a zLinux, WAS, and DB2 noob so please bear with me. I am helping to support two WebSphere applications which utilize DB2 under zLinux. One application is for Europe and the other for the US. Each application has multiple WAS servers and HTTP servers backed by their own DB2 server. A script is run for each application that exports data from a z/OS-based DB2 database into a file on the...
1
2226
by: beary | last post by:
Hello everyone, I'm not sure if this is the correct forum for this, and apologies for the length of this question, but I'm desperate for some good advice... I'm in way over my head with file permissions. The directory and files are sitting on a linux server. I know almost nothing about linux. The background: I was given a web share by my IT admin. Initially, the web share had 3 users, myself (as the owner) ,root (the group) and...
2
2047
by: beary | last post by:
Hello everyone, I posted this in unix/linux but it received no replies, so I assume it was the wrong forum. I'm trying here. I'm in way over my head with file permissions. The directory and files are sitting on a linux server. I know almost nothing about linux. The background: I was given a web share by my IT admin. Initially, the web share had 3 users, myself (as the owner) ,root (the group) and everyone. I could copy and paste from my...
13
2663
by: eclipsme | last post by:
I thought I had this licked, but apparently not. I have a file upload script that attempts to upload a file to a directory in the public_html directory - www.domain.com/upload The permissions for the directory have to be 777 for this to work or esle it aborts with a permissions error - obviously a problem. The php script runs as user 'nobody'. Tech support is through email, and level one is not that bright, or at
0
8999
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8836
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9575
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9394
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
9338
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8260
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6080
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4712
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
2
2798
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.