Desktop Functions: Smart Device Functions:
|
Search Results for "DM" in [All]msi
INSTALLTYPE_NETWORK_IMAGE = 1, // Administrative installation To perform an administrative installation, include ACTION=ADMIN in szCommandLine. For more information, see the ACTION property. ole323: BindMoniker
static extern int BindMoniker(UCOMIMoniker pmk, uint grfOpt,
Declare Function BindMoniker Lib "ole32.dll" (pmk As UCOMIMoniker, grfOpt As Integer, _
MSHCTX_NOSHAREDMEM = 1, quickusb
private static extern int QuickUsbFindModules(StringBuilder nameList, int bufferLength); urlmon
static extern int FindMimeFromData(IntPtr pBC,
Private Shared Function FindMimeFromData( _
Public Declare Function FindMimeFromData Lib "urlmon.dll" ( _
int ret = FindMimeFromData(IntPtr.Zero, null, dataBytes, dataBytes.Length, mimeProposed, 0, out outPtr, 0);
int result = FindMimeFromData(IntPtr.Zero, file, buf, MaxContent, null, 0, out mimeout, 0);
Dim result As Integer = FindMimeFromData(IntPtr.Zero, file, buf, MaxContent, Nothing, 0, mimeout, 0)
result = FindMimeFromData(0, "file://c:/test/form1.frm", vbNullString, 0, vbNullString, 0, buffAddr, 0) advapi32
case SecurityEntity.SE_TRUSTED_CREDMAN_ACCESS_NAME:
return "SeTrustedCredManAccessPrivilege";
SE_TRUSTED_CREDMAN_ACCESS_NAME
Const DOMAIN_ALIAS_RID_ADMINS As Integer = 544
Dim AdminGroup as IntPtr
If Not AllocateAndInitializeSid(NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, AdminGroup) Then
MsgBox("Yikes, couldn't create the Local Admininstrator Group's SID") 12: BackupEventLog eventLogSession.ExportLogAndMessages("Application", PathType.LogName, "", @"logFile.evtx", /tolerateQueryErrors*/ false, CultureInfo.CurrentCulture);
[DllImport("Certadm.dll", CharSet=CharSet.Auto, SetLastError=true)] Please see the CredMarshalCredential function.
Dim Token, ImpersonatedToken, AdminGroup As IntPtr
Dim IsAdmin As Boolean
' Next we build the SID for the local Administrators group
If Not AllocateAndInitializeSid(NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, AdminGroup) Then
MsgBox("Yikes, couldn't create the Local Admininstrator Group's SID")
' Lastly, we check to see if the impersonated token is in the Admin Group
If Not CheckTokenMembership(ImpersonatedToken, AdminGroup, IsAdmin) Then
FreeSid(AdminGroup)
MsgBox("IsAdmin=" & IsAdmin)
Dim user As String = "administrator"
CREATE_SEPARATE_WOW_VDM = 0x00000800,
String user = "administrator"; 17: CreateService
/// it should be granted only to administrators.
''' it should be granted only to administrators.
CREATE_SEPARATE_WOW_VDM = 0x00000800,
CREATE_SHARED_WOW_VDM = 0x00001000,
CREATE_SEPARATE_WOW_VDM = 0x00000800,
CREATE_SHARED_WOW_VDM = 0x00001000,
CREATE_SEPARATE_WOW_VDM = &H800
CREATE_SHARED_WOW_VDM = &H1000
static extern bool CredMarshalCredential(int credType,
Declare Function CredMarshalCredential Lib "advapi32.dll" (TODO) As TODO
NativeMethods.CredMarshalCredential(NativeMethods.CertCredential, 20: CryptGenKey
ALG_SID_DSS_DMS = 2, The LookupAccountName function attempts to find a SID for the specified name by first checking a list of well-known SIDs. If the name does not correspond to a well-known SID, the function checks built-in and administratively defined local accounts. Next, the function checks the primary domain. If the name is not found there, trusted domains are checked.
string accountName = "Administrator"; 22: LookupAccountSid The LookupAccountSid function attempts to find a name for the specified SID by first checking a list of well-known SIDs. If the supplied SID does not correspond to a well-known SID, the function checks built-in and administratively defined local accounts. Next, the function checks the primary domain. Security identifiers not recognized by the primary domain are checked against the trusted domains that correspond to their SID prefixes.
// Sid for BUILTIN\Administrators
public const string SE_TRUSTED_CREDMAN_ACCESS_NAME = "SeTrustedCredManAccessPrivilege"; 24: LsaOpenPolicy To administer the local security policy of a local or remote system, you must call the LsaOpenPolicy function to establish a session with that system's LSA subsystem. LsaOpenPolicy connects to the LSA of the target system and returns a handle to the Policy object of that system. You can use this handle in subsequent LSA function calls to administer the local security policy information of the target system.
LSA_AccessPolicy.POLICY_AUDIT_LOG_ADMIN |
LSA_AccessPolicy.POLICY_SERVER_ADMIN |
LSA_AccessPolicy.POLICY_TRUST_ADMIN |
POLICY_TRUST_ADMIN = 0x00000008L,
POLICY_AUDIT_LOG_ADMIN = 0x00000200L,
POLICY_SERVER_ADMIN = 0x00000400L,
LSA_AccessPolicy.POLICY_AUDIT_LOG_ADMIN |
LSA_AccessPolicy.POLICY_SERVER_ADMIN |
LSA_AccessPolicy.POLICY_TRUST_ADMIN |
POLICY_TRUST_ADMIN = 0x00000008L,
POLICY_AUDIT_LOG_ADMIN = 0x00000200L,
POLICY_SERVER_ADMIN = 0x00000400L,
public bool PasswordMatched;
public bool PasswordMatched;
public bool PasswordMustChangeAtNextLogon;
NERR_PasswordMustChange = 2701,
inputArgs.PasswordMatched = true; 27: TraceEvent
public static extern uint TraceEvent(Int64 traceHandle, ref ADMIN_EVENT_ETW_HEADER evnt); Interfaces
,BINDSTATUS_VERIFIEDMIMETYPEAVAILABLE
void AddMenu ( [In] int dwIDCtl, [In, MarshalAs ( UnmanagedType.LPWStr )] string pszLabel );
/// STDMETHOD(GetAssemblyProps)( // S_OK or error.
/// STDMETHOD(GetAssemblyRefProps)( // S_OK or error.
/// STDMETHOD(GetFileProps)( // S_OK or error.
/// STDMETHOD(GetExportedTypeProps)( // S_OK or error.
/// <param name="mdmr">[in] An <c>mdManifestResource</c> token that represents the resource for which to get the properties. </param>
/// STDMETHOD(GetManifestResourceProps)( // S_OK or error.
/// mdManifestResource mdmr, // [IN] The ManifestResource for which to get the properties.
[In] uint mdmr,
/// STDMETHOD(EnumAssemblyRefs)( // S_OK or error
/// STDMETHOD(EnumFiles)( // S_OK or error
/// STDMETHOD(EnumExportedTypes)( // S_OK or error
/// <param name="rManifestResources">[out] The array used to store the <c>mdManifestResource</c> metadata tokens.</param>
/// <param name="cMax">[in] The maximum number of <c>mdManifestResource</c> tokens that can be placed in <c>rManifestResources</c>.</param>
/// <param name="pcTokens">[out] The number of <c>mdManifestResource</c> tokens actually placed in <c>rManifestResources</c>.</param>
/// STDMETHOD(EnumManifestResources)( // S_OK or error
/// mdManifestResource rManifestResources[], // [OUT] Put ManifestResources here.
/// STDMETHOD(GetAssemblyFromScope)( // S_OK or error
/// STDMETHOD(FindExportedTypeByName)( // S_OK or error
/// <param name="ptkManifestResource">[out] The array used to store the <c>mdManifestResource</c> metadata tokens, each of which represents a manifest resource.</param>
/// STDMETHOD(FindManifestResourceByName)( // S_OK or error
/// mdManifestResource *ptkManifestResource) PURE; // [OUT] Put the ManifestResource token here.
void FindManifestResourceByName(
/// STDMETHOD_(void, CloseEnum)(
//STDMETHOD(FindAssembliesByName)( // S_OK or error
tdReservedMask = 0x00040800,
/// STDMETHOD(DefineScope)( // Return code.
/// STDMETHOD(OpenScope)( // Return code.
/// STDMETHOD(OpenScopeOnMemory)( // Return code. 32: ITask
public ushort wEndMonth; 33: ITaskTrigger
[MarshalAs(UnmanagedType.U2)] public ushort wEndMonth; 34: ITfLangBarMgr
///virtual HRESULT STDMETHODCALLTYPE AdviseEventSink(
///virtual HRESULT STDMETHODCALLTYPE UnadviseEventSink(
///virtual HRESULT STDMETHODCALLTYPE GetThreadMarshalInterface(
int GetThreadMarshalInterface(uint dwThreadId, uint dwType,
///virtual HRESULT STDMETHODCALLTYPE GetThreadLangBarItemMgr(
///virtual HRESULT STDMETHODCALLTYPE GetInputProcessorProfiles(
///virtual HRESULT STDMETHODCALLTYPE RestoreLastFocus(
///virtual HRESULT STDMETHODCALLTYPE SetModalInput(
///virtual HRESULT STDMETHODCALLTYPE ShowFloating(
///virtual HRESULT STDMETHODCALLTYPE GetShowFloatingStatus(
void ReadMultiple( miscAny chance of adding dsadmin.dll to the list, please? setupapi38: SetupCopyOEMInf A caller of this function is required have administrative privileges, otherwise the function fails.
Function findMIDIKeyAndDescriptor() As Boolean
findMIDIKeyAndDescriptor = True
findMIDIKeyAndDescriptor = False ws2_3240: socket
SOCK_RDM = 4, 41: SocketOptionName
AddMembership = 12, 42: WSASocket
SOCK_RDM = 4, shell3243: CSIDL
CSIDL_COMMON_ADMINTOOLS = 0x002f, // All Users\Start Menu\Programs\Administrative Tools
CSIDL_ADMINTOOLS = 0x0030, // <user name>\Start Menu\Programs\Administrative Tools 44: CSIDL
/// Version 5.0. The file system directory that is used to store administrative tools for an individual user.
CSIDL_ADMINTOOLS = 0x0030,
/// Version 5.0. The file system directory containing administrative tools for all users of the computer.
CSIDL_COMMON_ADMINTOOLS = 0x002f, 45: IsUserAnAdmin
/// Tests whether the current user is a member of the Administrator's group.
/// <returns>Returns TRUE if the user is a member of the Administrator's group; otherwise, FALSE.</returns>
/// It is recommended to call that function directly to determine Administrator group status rather than calling IsUserAnAdmin.
static extern bool IsUserAnAdmin(void);
''' Tests whether the current user is a member of the Administrator's group.
''' <returns>Returns TRUE if the user is a member of the Administrator's group; otherwise, FALSE.</returns>
''' It is recommended to call that function directly to determine Administrator group status rather than calling IsUserAnAdmin.
Public Function IsUserAnAdmin() As <MarshalAs(UnmanagedType.Bool)> Boolean Public Declare Function IsUserAnAdmin Lib "shell32" () As Long 46: ITaskbarList
void RegisterTab(IntPtr hwndTab, IntPtr hwndMDI);
Sub RegisterTab(hwndTab As IntPtr, hwndMDI As IntPtr) 47: ITaskbarList3
/// <param name="hWndMDI">Handle of the application's main window. This value tells the taskbar
void RegisterTab(IntPtr hWndTab, IntPtr hWndMDI);
/// <param name="hWndMDI">Handle of the application's main window. This value tells the taskbar
void SetTabActive(IntPtr hWndTab, IntPtr hWndMDI, UInt32 tbatFlags); 48: ITaskbarList4
void RegisterTab(IntPtr hwndTab, IntPtr hwndMDI);
public static extern IntPtr SendMessage(HandleRef hWnd, uint Msg, int wParam, IntPtr lParam);
public static extern IntPtr SendMessage(HandleRef hWnd, int msg, int wParam, string lParam);
//Win32.SendMessage(new HandleRef(null, hWnd), BFFM_SETSELECTIONA, 1, lpData);
SendMessage(new HandleRef(null, hWnd), BFFM_SETSELECTIONW, 1, _initialPath);
SendMessage(new HandleRef(null, hWnd), BFFM_SETSTATUSTEXTW, 0, pathPtr); 50: SHGetFolderPath
// to store administrative tools for an individual user.
AdministrativeTools = 0x0030,
// administrative tools for all users of the computer.
CommonAdministrativeTools = 0x002f,
CSIDL_COMMON_ADMINTOOLS = 0x002f, // All Users\Start Menu\Programs\Administrative Tools
CSIDL_ADMINTOOLS = 0x0030, // <user name>\Start Menu\Programs\Administrative Tools 51: SHGetImageList
int AddMasked(
public static readonly Guid AdminTools = new Guid( "724EF170-A42D-4FEF-9F26-B60E846FBA4F" );
public static readonly Guid CommonAdminTools = new Guid( "D0384E7D-BAC3-4797-8F14-CBA229B392B5" );
ADMINTOOLS = &H30
COMMON_ADMINTOOLS = &H2F
CSIDL_COMMON_ADMINTOOLS = 0x002f, // All Users\Start Menu\Programs\Administrative Tools
CSIDL_ADMINTOOLS = 0x0030, // <user name>\Start Menu\Programs\Administrative Tools
public static Guid AdminTools = new Guid("724EF170-A42D-4FEF-9F26-B60E846FBA4F");
public static Guid CommonAdminTools = new Guid("D0384E7D-BAC3-4797-8F14-CBA229B392B5");
static extern UInt32 SHSetUnreadMailCount(string pszMailAddress, UInt32 dwCount, string pszShellExecuteCommand);
Public Shared Function SHSetUnreadMailCount(ByVal pszMailAddress As String, ByVal dwCount As Integer, ByVal pszShellExecuteCommand As String) As Integer Enums57: CSIDL
CSIDL_ADMINTOOLS = 0x0030,
CSIDL_COMMON_ADMINTOOLS = 0x002f,
CSIDL_ADMINTOOLS = &H30
CSIDL_COMMON_ADMINTOOLS = &H2F
/// Returns the dmFields member of the printer driver's DEVMODE structure. The dmFields member indicates which members in the device-independent portion of the structure are supported by the printer driver.
/// Retrieves a list of supported paper sizes. The pOutput buffer receives an array of WORD values that indicate the available paper sizes for the printer. The return value indicates the number of entries in the array. For a list of the possible array values, see the description of the dmPaperSize member of the DEVMODE structure. If pOutput is NULL, the return value indicates the required number of entries in the array.
/// Retrieves the dimensions, in tenths of a millimeter, of each supported paper size. The pOutput buffer receives an array of POINT structures. Each structure contains the width (x-dimension) and length (y-dimension) of a paper size as if the paper were in the DMORIENT_PORTRAIT orientation. The return value indicates the number of entries in the array.
/// Returns the minimum paper size that the dmPaperLength and dmPaperWidth members of the printer driver's DEVMODE structure can specify. The LOWORD of the return value contains the minimum dmPaperWidth value, and the HIWORD contains the minimum dmPaperLength value.
/// Returns the maximum paper size that the dmPaperLength and dmPaperWidth members of the printer driver's DEVMODE structure can specify. The LOWORD of the return value contains the maximum dmPaperWidth value, and the HIWORD contains the maximum dmPaperLength value.
/// Retrieves a list of available paper bins. The pOutput buffer receives an array of WORD values that indicate the available paper sources for the printer. The return value indicates the number of entries in the array. For a list of the possible array values, see the description of the dmDefaultSource member of the DEVMODE structure. If pOutput is NULL, the return value indicates the required number of entries in the array.
/// Returns the dmSize member of the printer driver's DEVMODE structure.
/// Retrieves a list of supported media types. The pOutput buffer receives an array of DWORD values that indicate the supported media types. The return value indicates the number of entries in the array. For a list of possible array values, see the description of the dmMediaType member of the DEVMODE structure. If pOutput is NULL, the return value indicates the required number of entries in the array. Windows 2000: This flag is not supported. 59: DEVICE_TYPE
FILE_DEVICE_VDM = 0x2c,
FILE_DEVICE_VDM = &H2c
These constants are defined in Ntddk.h and Wdm.h. Check these files to see whether additional device types have been defined. 60: DISP_CHANGE
BadMode = -2,
BadMode = -2 Cut off search results after 60. Please refine your search. |