I have written an application, using VB.NET 2002 which can control the
W32Time service (aka "windows time"). Basically, what it does is stops the
service, waits for 5 seconds, then configures it and restarts it.
Now, the only way I can get this application to work is to have it trusted
by the machine that is running it. This however is going to cause problems
when I deploy it, since I would then have to go around every machine in our
office (around 150 at the last count), and manually have them trust the
assembly. Furthermore, any modification made to the assembly would require
each machine to be set up with the trust again.
Is there any way of programmatically fixing the application so that, when
loaded, it automatically assumes the user permissions necessary to allow the
W32Time service to be stopped, configured and then restarted?
TIA
Ian Henderson
Database Developer, VBA Programmer and very Novice VB.NET 2002 Developer
Now, this application works on my machine, becau 2 2164
You can roll out the program using SMS if you are on a domain.
"Ian Henderson" <ih********@essentiagroup.com> wrote in message
news:bj*******************@news.demon.co.uk... I have written an application, using VB.NET 2002 which can control the W32Time service (aka "windows time"). Basically, what it does is stops
the service, waits for 5 seconds, then configures it and restarts it.
Now, the only way I can get this application to work is to have it trusted by the machine that is running it. This however is going to cause
problems when I deploy it, since I would then have to go around every machine in
our office (around 150 at the last count), and manually have them trust the assembly. Furthermore, any modification made to the assembly would
require each machine to be set up with the trust again.
Is there any way of programmatically fixing the application so that, when loaded, it automatically assumes the user permissions necessary to allow
the W32Time service to be stopped, configured and then restarted?
TIA Ian Henderson Database Developer, VBA Programmer and very Novice VB.NET 2002 Developer
Now, this application works on my machine, becau
Pardon my ignorance, but what do you mean?
Surely you don't mean SMS as in Text Messages, do you?
If this can be done using VS2002 then I'm seriously interested.
Ian
"Scott Meddows" <sc******************@tsged.com> wrote in message
news:e3****************@TK2MSFTNGP09.phx.gbl... You can roll out the program using SMS if you are on a domain.
"Ian Henderson" <ih********@essentiagroup.com> wrote in message news:bj*******************@news.demon.co.uk... I have written an application, using VB.NET 2002 which can control the W32Time service (aka "windows time"). Basically, what it does is stops the service, waits for 5 seconds, then configures it and restarts it.
Now, the only way I can get this application to work is to have it
trusted by the machine that is running it. This however is going to cause problems when I deploy it, since I would then have to go around every machine in our office (around 150 at the last count), and manually have them trust the assembly. Furthermore, any modification made to the assembly would require each machine to be set up with the trust again.
Is there any way of programmatically fixing the application so that,
when loaded, it automatically assumes the user permissions necessary to allow the W32Time service to be stopped, configured and then restarted?
TIA Ian Henderson Database Developer, VBA Programmer and very Novice VB.NET 2002 Developer
Now, this application works on my machine, becau
This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: LazyAnt |
last post by:
Hello,
I have DB2 v8.1 for Linux for a class environment; each user has
his/her own database as dbadm and they are suppose to study queries
from another database.
They have the right...
|
by: edge |
last post by:
hi,
here it is my problem.
My console app, reads a text file where it grabs
username/password. Next, my app creates a .BAT file to
trigger the command ftp:\\user:password@ftphomeaddress.
...
|
by: Namratha Shah \(Nasha\) |
last post by:
Hey Guys,
Today we are going to look at Code Access Security.
Code access security is a feature of .NET that manages code depending on its
trust level. If the CLS trusts the code enough to...
|
by: Marina |
last post by:
Hi,
I am trying to find the minimum security settings to allow a windows control
embedded in IE have full trust.
If I give the entire Intranet zone full trust, this works. However, this is...
|
by: Lee Gillie |
last post by:
I need to be able to kill a process programmatically under ASP.NET. IIS
runs under the local system account. The user accessing the web is using
anonymous access.
We would prefer NOT to grant...
|
by: Nick |
last post by:
Is there a way to do declarative security on abstract classes? I am working
on a data access layer and would like to place all permission requirements on
the base class so all inherited classes...
|
by: Budhi Saputra Prasetya |
last post by:
Hi,
I managed to create a Windows Form Control and put it on my ASP .NET page. I
have done the suggestion that is provided by modifying the security settings.
From the stack trace, I would...
|
by: Jan |
last post by:
How do I grant permission to use reflection by a remoting server object?
I'm trying to use Type.InvokeMethod in the server object class but I get a
MissingMethodException: "Method '<namenot...
|
by: Mike |
last post by:
Hi
I have problem as folow:
Caught Exception: System.Configuration.ConfigurationErrorsException:
An error occurred loading a configuration file: Request for the
permission of type...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
| |