473,796 Members | 2,801 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Querying the local machine security policy

Is there any way for a program when loaded to query the local machine zone
to determine what the security policy settings are and what permissions are
available.

The program I have written requires access to almost all permissions
requiring the full trust in the my computer zone. If the local machine
security level has been set otherwise then I would have to error trap
virtually every call to the registry, file IO and environment. There has to
be an easier way although I just can't seem to find it in the help info.

Any ideas would be appreciated.

Mike
Feb 19 '06 #1
1 1491
http://www.kjmsolutions.com/downloads/lsa.zip

I hope this gets you started. Needs some work yet.

--
Get a powerful web, database, application, and email hosting with KJM
Solutions
http://www.kjmsolutions.com

"Michael" <mc********@hou ston.rr.com> wrote in message
news:OH******** **********@torn ado.texas.rr.co m...
Is there any way for a program when loaded to query the local machine zone
to determine what the security policy settings are and what permissions
are available.

The program I have written requires access to almost all permissions
requiring the full trust in the my computer zone. If the local machine
security level has been set otherwise then I would have to error trap
virtually every call to the registry, file IO and environment. There has
to be an easier way although I just can't seem to find it in the help
info.

Any ideas would be appreciated.

Mike

Feb 19 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
383
by: Jack | last post by:
I am working on a dotnet project to write an application that can audit and write registry and local security policy entries on multiple standalone (not networked) and domain computers. Since standalone machines are involved, Active Directory and group policy may or may not be a factor, so I must assume entries are not inherited from the domain group policy. So, my question is, how can I gain access to the computer configuration settings...
3
3180
by: Dave McCracken | last post by:
I am hosting .Net UserControls in HTML pages with Object Tags. These UserControls are clients of remotable objects that run on the same machine. The remote objects execute callbacks via sponsor objects. The UserControl client creates and passes these sponsor objects to the remote objects. I am able to launch .Net UserControls and their dependent .Net components in HTML pages using the Object tag. I had to do the following to get it to...
1
4759
by: Andrew | last post by:
Hey all, Working on revamping our Intranet here and making use of the LDPA, Active Directory, Directory Services, etc. that .Net provides. I am still fairly new on this subject, so the problem I have run into I am not sure how to fix, and really not sure what is causing it. Here's what is going on (test server - Windows 2003 Server): I have a page in a folder (under anonymous authentication in IIS6) that has a link on it that...
5
2123
by: bjarne | last post by:
I´ve made a desktop application in C# (.NET 1.1) and now I would like it to run in a local intranet. I know that I can change the .NET configuration on each client and give the specific application FULL_TRUST permission on the machine ... but isn´t there an easier way ?? Each assembly in the application is strong named, and I seem to remember that this should make it possible to have .NET prompt each user for FULL_TRUST permission when...
1
4049
by: Mike L | last post by:
How do I push out a new version of my C# exe file to all the client computers? The client computers are in my local area network, and I have administrator rights. Currently I walk over to each computer and copy the exe file off the fileserver and copy the exe to the client's local hard drive. The method I use for my VB 6.0 exe, works a lot better. I leave the VB 6.0 exe on the fileserver and create a shortcut from the client computer to...
6
1916
by: Michael | last post by:
I am running an application that requires "Full Trust" which is declared in the assembly. How do I trap for the System.Security.Policy.PolicyException that is raised by a local machines CAS if its current policy will not allow "Full Trust", ie its running in the Intranet Zone. I am trying to trap the error to advise users to have adm revise policy to permit running the program otherwise a cryptic debug screen is raised.
3
7945
by: W C Hull | last post by:
We have a request from Auditing to modify the password an a local workstation administrative account every 90 days. We are developing two programs - a VB6 GUI program that will allow the administrative support person to enter a new password into an App and have that encrypted password saved in a text file. The second part is a VB6 program that only is a command line program that will open the password text file, read the encrypted...
15
11076
by: eltonchew | last post by:
Hi, We have an inhouse developed VB.NET Windows application which runs successfully only when the user is given a local administrator rights. Without which, it fails to start. There isn't anything reported on the event viewer. Giving the user full access to C:\ drive also doesn't do the trick. Unfortunately, we do not have the code of this application and hence cannot view what the application is trying to access. Note that we have both...
3
1343
by: =?Utf-8?B?SmFtZXMgV29uZw==?= | last post by:
Hi everybody, I'm facing a problem to run an appliation in a shared network drive. The application is developed in VB2005. I understand I have to add a signature with strong name key to all assambies. I found that I have to modify security policy to trust strong names. I want to clarify the followings: 1. Does it mean I have to modify the security policy for each client machine which runs my application in network drive?
0
9673
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10217
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10003
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9047
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7546
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6785
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5568
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4114
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3730
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.