In the Site Collection level there is a Page library, which has been created along with the whole site. I didn't touch it for long time until recently I added new content types, modified some page layouts and master pages using a solution file. When accessing the home page using the site configured for anonymouse user it failed with "401...
Hi,
I'm having problems trying to connect my java program to 2 different sockets. Basically I want to initialise my RMI Server (connecting to port 1099) and then also initialise PrologBeans on port 10002. The initialisation seems to work fine for both, but as soon as I try to access the prologBeans I get the following error:
Exception ...
Hello, everyone!
I've build a Netbeans project with enabled Java Webstart. The .jar itself seems not to be changed, but there are new files such as launch.jnlp. Inside there are some references to other jars and to that of the main project.
The project now can be launched not only with java -jar MyProject.jar, but also with javaws laun...
We have a rather complicated system of permission handling in our (ASP.NET web) application. Users can have specific permissions on different kinds of objects, some permissions are even packed into groups / roles that are assigned to users. All in all this ends up in a pretty complicated mess where for determining whether a user can do /...
Hi all,
I have copied parts of an old ASP website out into a new website. On my local machine where the code was cleaned up and tested the website works perfectly, however, on the Windows Server 2000 machine it needs to run on I am getting an error:
HTTP 403.1 Forbidden: Execute Access Forbidden
Internet Information Services
---------...
Within my logic layer I have the need to check permissions for a wide variety of actions. Some actions are generic but some are highly specialized. Each action has a corresponding permission hierarchy that is evaluated prior to performing the action. I have been tossing around architecture ideas in my head but haven't reached a solid one...
I have a tray application that registers with the shell to receive notifications when a drive is added to the system or when media is inserted into a drive (via SHChangeNotifyRegister). Upon receipt of those notifications, I attempt to open the drive to query some properties from it. For my testing I am using a simple USB flash drive. ...
How can I disallow adding item or document to a list or document library? Due to some other feature scenario I cannot break role inheritance and have custom permission set for the list. Today, we restrict the addition using event handler (Item adding) – but this leads to poor UX.
Is there a way to have Role inheritance for a list and s...
Hi,
I am developing a Facebook App which requires some extended permission. The problem is that Facebook doesn't automatically ping my app when those permissions are granted by the user. I have to manually query for them or the user must press a confirmation button to send them to me.
My question is how can I enable Facebook to ping m...
By default when I upload new images, the folder created have 777
permissions
Is there a way to restrict permissions on the new folders?
Thanks
...
I have a production website that, once built in TFS is re-deployed and updated using xcopy. The entire site (excluding the root directory) it deleted then the new site copied in. This works well.
We use a 3rd party charting package that creates images at runtime and then renders a link to them. In order to do this it needs write permiss...
I'm writing a small authorization systems which has read, write, execute, append and delete permissions. If someone can write he can obviously also delete and append, so delete and append are part of write. I think all write operations could be expressed as append and delete and wonder if there would be any reason to distinguish between ...
There is a SQL Server 2005 database with mixed-mode authentication.
Among others, we have the following logins on the server: our-domain\developers-group-1, and our-domain\developers-group-2 which are AD groups.
The our-domain\developer-group-2 is added to the sysadmin role on the server, by virture of which all domain users of that ...
My application is raising an unauthorized access error. While running my application, I try to access a directory in the following location: Application.UserAppDataPath.
The Problem: It says I do not have permission to access the Application.UserAppDataPath directory
Is there a way to set permissions within my application source code? ...
I am making a card game in ruby.
I have the Game class, which has an array of Player objects.
array_of_players = Array[
Player.new("Ben"),
Player.new("Adam"),
Player.new("Peter"),
Player.new("Fred"),
]
my_game = Game.new(array_of_players)
puts my_game.players[2].name #=> Peter
Each player also has access to the Game, so ...
Today I ran a bunch of doctests using Python 2.6 on a Ubuntu 9.10 with nose :
nosetests --with-doctest
Ran 0 tests in 0.001s
OK
WTF? I had tests in that files, why didn't that work?
I changed permission to 644:
sudo chmod 644 * -R
nosetests --with-doctest
Ran 11 test in 0.004s
FAILED (errors=1)
Changing it back to 777:
sudo chm...
I get the following Exception running my app:
java.net.SocketException: Permission denied (maybe missing INTERNET permission)
How do I solve the missing permission problem?
...
When I do a simple delete of the contents of a folder, I get an error:
<delete includeemptydirs="true">
<fileset dir="${developmentenvironment.www.dir}" includes="**/*"/>
</delete>
C:\Users\...\build.xml:42: Unable to delete file C:\...\www\appserv\AUTHORS.txt
When, I try to delete the file in the OS, it requires elevated permiss...
Hello
I am not a DBA and so dont really know anything about SQL 2005 security settings, etc. I am attempting to set up an empty copy of our database by generating the full database from SQL Management Studio generated scripts. Unfortunately I don't know what many of the options do and the MSFT documentation of this processes isn't great...
I will have multiple tables used by different projects on the same mySql server. Much of the data is sensitive, and needs to be behind permissions wall. However many of the tables of sensitive data rely on tables of insensitive data for user and department information. So I see three options ahead of me and I am unsure which one to pi...