Bizarre one...
I'm probably going to get a lot of heat for this but how do I resume an installation after a reboot if the profile it ran from originally gets renamed. E.g. install ran under Administrator.. the account was renamed to NewAdministrator and then the PC is restarted and you logged in using NewAdministrator?
What I'm getting now is a message that indicates there is a pending install that ran under Administrator and it must run under that profile to continue the installation.
What I'm getting now is a message that indicates there is a pending install that ran under Administrator and it must run under that profile to continue the installation.
0 Comments
[ + ] Show comments
Answers (17)
Please log in to answer
Posted by:
AngelD
15 years ago
Posted by:
anonymous_9363
15 years ago
Posted by:
jayteeo
15 years ago
VBScab is correct. A CA inside the package is renaming the account. After the account is renamed, the computer is forced to restart. Upon logging in, I'd like for the installation to resume but instead it displays a message that the installation ran under the original account (although I'm logging in with the same account, same SID.. just renamed). Any ideas?
AngelD - It is setup to run per-machine. I actually want it to continue the installation so I dont want to remove that key.
AngelD - It is setup to run per-machine. I actually want it to continue the installation so I dont want to remove that key.
Posted by:
anonymous_9363
15 years ago
Posted by:
AngelD
15 years ago
Posted by:
anonymous_9363
15 years ago
Posted by:
aogilmor
15 years ago
ORIGINAL: VBScab
false protectionWell, in common with this type of thing, it's designed to keep out the casual/amateur hacker, the guy who's seen the default Administrator password on a Post-It note on a Helpdesk operator's screen. No-one pretends it would keep out the determined type.
interesting discussion. I don't pretend to be a security expert, but I was at one time product manager for antivirus at a large engineering co. and wrote "batch scripts" to update dat files (yeah I know it's weak but it worked). AV/security has come a long way, threats gotten more sophisticated, etc. I think key is redundant levels of protection, for example, your ISP and email provider probably have pretty decent security because it's in their interest to do so. But do you rely totally on them? No, probably not, you have your own virus protection as well as practicing safe computing.
I think we can agree that it's a bad practice to rename an account in an MSI package...that was something I never even considered. Jay should submit that to thedailywtf, for real!
Posted by:
revizor
15 years ago
Posted by:
AngelD
15 years ago
Posted by:
reds4eva
15 years ago
Posted by:
jayteeo
15 years ago
Posted by:
AngelD
15 years ago
Posted by:
anonymous_9363
15 years ago
Posted by:
jayteeo
15 years ago
Posted by:
revizor
15 years ago
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.
so that the conversation will remain readable.