473,473 Members | 2,319 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Check security access

1 New Member
I've been asked to create an application that basically does an archive with a few tweaks along the way. My concern is that when I try to do the copy or delete from the source directory, I may come across some security issues for either one or both of those steps. In the interest of saving processing time I'm using CopyDirectory and DeleteDirectory commands rather than going through the files one by one. However, I've been thinking about doing a pre-archive process which would check security status on each file and allow the user to amend the security settings before the archive begins. My problem is that I have no idea how to check the access for a file to make sure that my archive will be able to do both steps. I've done some Internet investigation but any possibilities I see there are for someone with more experience than I have. I am quite new to programming with Visual Basic so please keep any suggestions simple.
Dec 5 '22 #1
0 5673

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: eddie wang | last post by:
Hello, I inherited an Access application from a previous coworker. It seems the Spell Check is never enabled unless I open the application by holding down the shift key and double clicking the...
2
by: eddie wang | last post by:
Hello, I inherited an Access application from a previous coworker. It seems the Spell Check is never enabled unless I open the application by holding down the shift key and double clicking the...
2
by: aaj | last post by:
Hi all I have a continuous bound form and on each record is a tick box. The user ticks the boxes and these boxes define the batch. for future operations before they leave the page I count...
2
by: Cassie Pennington | last post by:
Is there a command to spell check fields in Access (probably in the afterupdate event)? Thanks in anticipation Cassie
2
by: Jesper Stocholm | last post by:
I have implemented role-based security within my ASP.Net application. However, it seems the role is not passed to the authentication ticket I create. I want to use it to display/hide some...
29
by: Patrick | last post by:
I have the following code, which regardless which works fine and logs to the EventViewer regardless of whether <processModel/> section of machine.config is set to username="SYSTEM" or "machine" ...
1
by: Randall Parker | last post by:
I haven't written the security part of my ASP.Net v1.1 app yet. I'm wondering if I have to write security code into every aspx page to check for an existing validated session or if there's some way...
1
by: Jake | last post by:
Hello, I am developing an application and there is a specific area in which I want a specific group of windows users to access only. The users belong to a group called Security1. How can I test...
1
by: Shimon Sim | last post by:
How to specify security access for assembly running in ASP.NET? FxCop requests it always and I always ignore it. I am thinking that this is good thing to know how to do. I usually need the...
0
by: parez | last post by:
Hi, I have a setup and deployment project. I am using vs 2008. During the setup process, I want to give full security access to run a network exe. How do i do it? I can create a batch...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.