473,404 Members | 2,187 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Maybe I've been looking at this too long...

I have an application that copies files from one folder on a client machine
over the network to another folder on the server and it works very well. The
To and From locations are hard coded into the application. Several others
are now interested in the application and I put together another simple
config file that can be defined separately for each machine. When I load the
config file into the application I get a "Permission Denied" error during
the copy procedure. Upon checking the values between the hard code and the
loaded variables, I find they are identical. All folders are shared and have
been given FULL CONTROL for everyone yet I get this error. What am I missing
or should I just go fishing for a few days and maybe it will go away?
Jul 17 '05 #1
3 1587
Well it wont go away with the fishing...but hey it does relax :-).

I believe one of the files is alreadu used by a process and therefore cannot
be overwritten since it's open by another application.
--
Stéphane Richard

"edoepke" <ed*****@comcast.net> wrote in message
news:ob********************@comcast.com...
I have an application that copies files from one folder on a client machine over the network to another folder on the server and it works very well. The To and From locations are hard coded into the application. Several others
are now interested in the application and I put together another simple
config file that can be defined separately for each machine. When I load the config file into the application I get a "Permission Denied" error during
the copy procedure. Upon checking the values between the hard code and the
loaded variables, I find they are identical. All folders are shared and have been given FULL CONTROL for everyone yet I get this error. What am I missing or should I just go fishing for a few days and maybe it will go away?

Jul 17 '05 #2
Ah Ha! Good point. Thanx.

"Stephane Richard" <st**************@verizon.net> wrote in message
news:el*******************@nwrdny01.gnilink.net...
Well it wont go away with the fishing...but hey it does relax :-).

I believe one of the files is alreadu used by a process and therefore cannot be overwritten since it's open by another application.
--
Stéphane Richard

"edoepke" <ed*****@comcast.net> wrote in message
news:ob********************@comcast.com...
I have an application that copies files from one folder on a client

machine
over the network to another folder on the server and it works very well.

The
To and From locations are hard coded into the application. Several others are now interested in the application and I put together another simple
config file that can be defined separately for each machine. When I load

the
config file into the application I get a "Permission Denied" error during the copy procedure. Upon checking the values between the hard code and the loaded variables, I find they are identical. All folders are shared and

have
been given FULL CONTROL for everyone yet I get this error. What am I

missing
or should I just go fishing for a few days and maybe it will go away?


Jul 17 '05 #3
On Fri, 31 Oct 2003 01:58:34 GMT, "Stephane Richard"
<st**************@verizon.net> wrote:
Well it wont go away with the fishing...but hey it does relax :-).

I believe one of the files is alreadu used by a process and therefore cannot
be overwritten since it's open by another application.
--
Stéphane Richard


Or even a source file is open in Deny Read mode ...
Jul 17 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

12
by: stefanogaburri | last post by:
This is crossposted to comp.lang.python & comp.multimedia; if there is a better place to go please tell me :) I've been asked to build a quick-and-dirty prototype of a simple computer-based...
9
by: Brian Kelley | last post by:
I have been using gettext and various utilities to provide internationalization for a wxPython application and have not really been liking the process. Essentially it uses a macro-style notation...
11
by: Ville Vainio | last post by:
It might just be that @decorator might not be all that bad. When you look at code that uses it it's not that ugly after all. A lot of the furor about this is probably because it happened so...
6
by: Dan | last post by:
I am working with the C-API to MYSQL Ver 12.16 Distrib 4.0.5a-beta, for pc-linux (i686). I have noticed the following problem. Within my C program I issue --- conn = mysql_init(NULL); conn =...
9
by: Colin McGuire | last post by:
Hi, I have an report in Microsoft Access and it displays everything in the table. One column called "DECISION" in the table has either 1,2, or 3 in it. On my report it displays 1, 2, or 3. I want...
25
by: Amarendra GODBOLE | last post by:
Hi, I am working on a legacy user space app, which has been developed entirely in C, some 15 years ago. Needless to say, it does not even partially conform to any standard. My team is in the...
2
by: MLH | last post by:
I invoked the combo-box wizard today, telling it to use a 4-table union query as a row-source for the combo-box it was assisting me in building. The error I got was without number and stated,...
9
by: James Crosswell | last post by:
I'm not sure if I'm going about this the right way - it may be that Generics might be able to help me out here... but here goes: I have three classes as follows class BaseEdit class WidgetEdit:...
16
by: graham.keellings | last post by:
hi, I'm looking for an open source memory pool. It's for use on an embedded system, if that makes any difference. Something with garbage collection/defragmentation would be nice. It should have...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.