473,395 Members | 1,624 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Need Help with vb.net problem and IE Security

Ok I have made an .net active x control
if you want to view it
http://mapguide.alignex.com/test/axtest2.html
Site needs to be fully trusted.. So i will understand if you dont want to
view it.

Problem I need to eather Shell out a command or
I need to open another internet explorer inside of this active x control

Both ways shelling and calling the AxWebBrowser .dll I get the error of
permissions issues.
Error is
SHELL ERROR
System.security.securityexecption: Request for the permission of type
system.security.permissions.securitypermission, mscorlib,
version=1.0.5000.0, culture=neutral, publickeytoken=b77a5c561934e089 failed
as system.security.codeaccessSecurityEngine.CheckToke nBasedSetHelper(boolean
ignoreGrants, TokenBasedSet Grants, TokenBasedSet denied, TokenBasedSet
demands) at
system.security.codeaccessSecurityEngine.CheckSetH elper(PermissionSet
Grants, PermissionSet Denied, PermissionSet Demands) at
microsoft.visualbasic.interaction.Shell()

the ax brower .dll I also get a permission issue
so what is happening is the active x is running through internet explorer as
a .dll. I am trying to shell or have a nother instance of ie inside my
active x.

IS this possible to do with security permissions>?

Can somebody please help..
Chris

Nov 21 '05 #1
0 959

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Ken Varn | last post by:
I have a named mutex object that is accessed by both an asp.net application and a Windows executable .net application. The Windows executable runs under the administrator logon, while the asp.net...
5
by: Rob R. Ainscough | last post by:
This is more of a conceptual question: 1. More and more companies are using VPN's and locking out internet connectivity (for a host of reasons, security, productivity, etc.). 2. ASP.NET...
3
by: Jeffrey | last post by:
Good day all, I have seen so many postings dealing with MS Access as a security risk and other items, yet I see now clear reason why. I would really like someone to point me in the right...
7
by: Timothy Shih | last post by:
Hi, I am trying to figure out how to use unmanaged code using P/Invoke. I wrote a simple function which takes in 2 buffers (one a byte buffer, one a char buffer) and copies the contents of the byte...
10
by: Jayme Pechan | last post by:
I wrote a very simply web application and I'm having all sorts of problems with the security getting in the way. All the web application does is load an out-of-process COM server that is running...
8
by: Sai Kit Tong | last post by:
In the article, the description for "Modiy DLL That Contains Consumers That Use Managed Code and DLL Exports or Managed Entry Points" suggests the creation of the class ManagedWrapper. If I...
2
by: Larry David | last post by:
Hi, This is one of those posts where not only do I not know the answer, I don't fully understand the *question* that I should be asking... but I'll try my best: I've designed a web site which...
4
by: IcedCrow | last post by:
I have stumbled upon a serious problem and I hope someone can help me out. I have programmed a web service in VB.NET. When I use integrated security for the piece, of course it does not use...
1
by: =?ISO-8859-1?Q?Lasse_V=E5gs=E6ther_Karlsen?= | last post by:
I get the above error in some of the ASP.NET web applications on a server, and I need some help figuring out how to deal with it. This is a rather long post, and I hope I have enough details that...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.