On Mon 04 Jul 2022 at 23:03:14 (+0100), Paul Hodges wrote:
>  From:   Aaron Hill <lilyp...@hillvisions.com> 
> > On 2022-07-04 1:50 am, Andrew Bernard wrote: 
> > > I see from searching that the issue is with elevated and non elevated 
> > > permissions. 
> >  
> > Where do you see this?  Drag-and-drop is a simple feature of the Windows  
> > shell that should require no special permission. 
> 
> Blocking dropping onto elevated targets from a non-elevated desktop has been 
> a security feature of UAC since it was introduced a decade and a half ago.  
> You can remove the restriction by running with UAC turned off, which the 
> security-minded will of course advise you not to do, and many people have no 
> clue about anyway (it is, however, the way I run my machine, because I choose 
> how to control my security myself).
> 
> Alternatively, you can get a third-party file manager, run it with elevated 
> permissions, and then drop and drop within it - but you can't elevate Windows 
> Explorer to try to get the same effect.

This, and workarounds, is discussed here, but I'm not a Windows user
so I can't comment on its accuracy:

https://superuser.com/questions/59051/drag-and-drop-file-into-application-under-run-as-administrator

Cheers,
David.

Reply via email to